Select Page
Viewing Memory in PowerShell

Viewing Memory in PowerShell

Hello there, this is Benjamin Morgan, and I’m a Premier Field Engineer covering Active Directory and Platforms related topics. This is my first blog post I hope you are all as excited about this as I am! Today I wanted ... continue reading
Built-In Administrator Account Lockout

Built-In Administrator Account Lockout

Hello, my name is Jason Krause and this is my first time writing a blog post for AskPFEPlat. I am a Platforms PFE here at Microsoft and work primarily in Active Directory and Group Policy. Recently a customer approached me ... continue reading
Monitoring Large DPM Deployments with SCOM

Monitoring Large DPM Deployments with SCOM

DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. One way to monitor the DPM servers centrally is using SCOM. In this blog, our guest, John Joyner, talks about leveraging Central Console ... continue reading
New ransomware, old techniques: Petya adds worm capabilities

New ransomware, old techniques: Petya adds worm capabilities

(Note: We have published a follow-up blog entry on this ransomware attack. We have new findings from our continued investigation, as well as platform mitigation and protection information: Windows 10 platform resilience against the Petya ransomware attack.) On June 27, ... continue reading
Using Computer Name Aliases in place of DNS CNAME Records

Using Computer Name Aliases in place of DNS CNAME Records

Hi everyone. Graeme Bray here with an article around using Computer Name Aliases instead of DNS CName records. Introduction In the past, we used to set the registry key DisableStrictNameChecking to be able to add a DNS alias to connect ... continue reading
Migrating Datacenter to Azure - Part 2

Migrating Datacenter to Azure – Part 2

This post provides an overview of key technical considerations, actionable recommendations and common pitfalls related to migration of workloads from an on-premises datacenter to Microsoft Azure. The business related considerations were addressed within the Migrating Datacenter to Azure – Part ... continue reading
Migration Datacenter to Azure – Part 2

Migration Datacenter to Azure – Part 2

This post provides an overview of key technical considerations, actionable recommendations and common pitfalls related to migration of workloads from an on-premises datacenter to Microsoft Azure. The business related considerations were addressed within the Migrating Datacenter to Azure – Part 1 ... continue reading
Enable remote access to Work Folders using Azure Active Directory Application Proxy

Enable remote access to Work Folders using Azure Active Directory Application Proxy

We’re excited to announce Work Folders now supports using Azure Active Directory Application Proxy to enable remote users to securely access their files on the Work Folders server. Work Folders supports using VPN, Web Application Proxy (WAP) or a third-party ... continue reading
1

Hyper-V authentication in Windows Server 2016 for managing remote Hyper-V servers through RSAT

Hello, my name is Ayushie Bhat and I’m a Support Engineer with the Windows Core team. Today, I’m going to talk about the authentication in Windows Server 2016 and discuss the case of creating a VM on a CORE server ... continue reading
Windows Server 2016 labs

Credential Guard lab companion

If you have heard about Credential Guard in Windows Server 2016 (and in Windows 10), but do not have an environment to try it out, here is a lab environment we built for you to play. Lab access The link ... continue reading