Select Page
Microsoft BitLocker Administration and Monitoring (MBAM v2.5) Tips

Microsoft BitLocker Administration and Monitoring (MBAM v2.5) Tips

The goal of this blog is to share some information learned (the hard way) from recent customer engagement. Hopefully these tips will save you time and accelerate future MBAM deployments. MBAM has dependencies on SQL Server, IIS web services and ... continue reading
Configure Storage Spaces Direct on a Virtual Lab - Step by Step

Configure Storage Spaces Direct on a Virtual Lab – Step by Step

How to configure a Storage Spaces Direct cluster and a hyper-converged Hyper-V on a virtual lab with four storage VMs.continue reading
How to Build Windows Storage Spaces Direct on a Virtual Lab

How to Build Windows Storage Spaces Direct on a Virtual Lab

Step by step instructions to build a Windows Storage Spaces Direct virtual lab on PC. PowerShell script to automate the process.continue reading
Securing RDP with IPSec

Securing RDP with IPSec

Hi Everyone, this is Jerry Devore back with a follow-up topic from my previous post on Privileged Administrative Workstations (PAW) which is a hardened device configuration used to protect privileged credentials. In that post, I mentioned that it is possible ... continue reading
Viewing Memory in PowerShell

Viewing Memory in PowerShell

Hello there, this is Benjamin Morgan, and I’m a Premier Field Engineer covering Active Directory and Platforms related topics. This is my first blog post I hope you are all as excited about this as I am! Today I wanted ... continue reading
Built-In Administrator Account Lockout

Built-In Administrator Account Lockout

Hello, my name is Jason Krause and this is my first time writing a blog post for AskPFEPlat. I am a Platforms PFE here at Microsoft and work primarily in Active Directory and Group Policy. Recently a customer approached me ... continue reading
Monitoring Large DPM Deployments with SCOM

Monitoring Large DPM Deployments with SCOM

DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. One way to monitor the DPM servers centrally is using SCOM. In this blog, our guest, John Joyner, talks about leveraging Central Console ... continue reading
New ransomware, old techniques: Petya adds worm capabilities

New ransomware, old techniques: Petya adds worm capabilities

(Note: We have published a follow-up blog entry on this ransomware attack. We have new findings from our continued investigation, as well as platform mitigation and protection information: Windows 10 platform resilience against the Petya ransomware attack.) On June 27, ... continue reading
Using Computer Name Aliases in place of DNS CNAME Records

Using Computer Name Aliases in place of DNS CNAME Records

Hi everyone. Graeme Bray here with an article around using Computer Name Aliases instead of DNS CName records. Introduction In the past, we used to set the registry key DisableStrictNameChecking to be able to add a DNS alias to connect ... continue reading
Migrating Datacenter to Azure - Part 2

Migrating Datacenter to Azure – Part 2

This post provides an overview of key technical considerations, actionable recommendations and common pitfalls related to migration of workloads from an on-premises datacenter to Microsoft Azure. The business related considerations were addressed within the Migrating Datacenter to Azure – Part ... continue reading