Select Page
Getting Reports from Long Running Performance Monitor Data Collector Sets

Getting Reports from Long Running Performance Monitor Data Collector Sets

Hello everyone, my name is still David Loder, and I'm still PFE out of Detroit, Michigan. And I have a confession to make. What you are about to read took me three revisions back and forth with my customer until ... continue reading

Secure remote access to on-premises apps

As COVID-19 continues to require social distancing to ensure everyone’s safety, we have seen many companies support their employee’s needs and promote safety by allowing them to work from home and use online tools to collaborate. This has led to ... continue reading
Az Update Azure Stack HCI and the future, PowerShell 7 SSH Remoting, AI to save lives

Az Update Azure Stack HCI and the future, PowerShell 7 SSH Remoting, AI to save lives

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on a couple of exciting things I learned this week. In this update, I want to ... continue reading
How to Build an Azure Automation Lab

How to Build an Azure Automation Lab

Hello fellow IT industry professionals! I’m Preston K. Parsard, and I’m truly excited to bring you some awesome automation opportunities, so to start, let’s consider these scenarios: 1. You’re an IT professional and to stay competitive, relevant and enhance your ... continue reading

Introduction to Building a Replica Domain Controller ARM Template

The idea behind this blog series came after something I noticed Microsoft does not have from an artifact perspective. Microsoft talks a lot about infrastructure as code by using ARM Templates. ARM Templates make cloud deployments declarative, idempotent, and add ... continue reading
Stretch-01-Config.png

Disaster Recovery in the next version of Azure Stack HCI

Disaster can hit at any time. When thinking about disaster and recovery, I think of 3 things Be prepared Plan on not involving humans Automatic, not automated Having a good strategy is a must. You want to be able to ... continue reading
skissel_0-1584993340479.png

Azure DSC for Zero Trust Windows 10 Devices Managed by Intune

Introduction Zero Trust is defined by Microsoft as model that “assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to ... continue reading
Wadhrama PARINACOTA attack chain

Human-operated ransomware attacks: A preventable disaster

Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft ... continue reading
Building the Totally Network Isolated Root Certification Authority

Building the Totally Network Isolated Root Certification Authority

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately I have done quite a few Public Key Infrastructure (PKI) migrations for customers mostly because their certification authorities ... continue reading
Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. In this post, I am going to show you how to use a minimal set of Group Policy objects ... continue reading