Select Page
RDmi (RDS modern infrastructure)

Part 1 Ultimate Step to Remote Desktop Services HTML5 on Azure QuickStart Deployment #RDS #S2D #VDI #RDP #RDmi

As I did already an step by Step Step by Step Server 2016 Remote Desktop Services QuickStart Deployment  #RDS #VDI #RDP #RemoteApp Step by Step Server 2016 Remote Desktop Services QuickStart Deployment #RDS #VDI #RDP #RemoteApp that’s Covering all the ... continue reading
clip_image002

WNV Deep Dive Part 6 – Container Networking: Transparent and L2bridge Networks

By James Kehr, Networking Support Escalation Engineer The next Container network type on the list is called, transparent. Production Container workloads, outside of swarms and special Azure circumstances, should be using a transparent network. Unless you need to use L2 ... continue reading
clip_image002

WNV Deep Dive Part 4 – Looking at LBFO and Hyper-V traffic

By James Kehr, Networking Support Escalation Engineer We’re going to look at the two other basic types of WNV traffic in part 4: LBFO (NIC teaming) and Hyper-V. I’ll be skipping over Hyper-V Network Virtualization and Software Defined Networks. The ... continue reading
image

Getting Started with #Azure Data Science Virtual Machine on Windows 2016 #DSVM #winserv #VSTS #DevOps

The Data Science Virtual Machine (DSVM) is a ‘Windows Server 2016 with Containers’ VM & includes popular tools for data exploration, analysis, modeling & development. Highlights: Microsoft R Server – Dev. Ed. (Scalable R) Anaconda Python SQL Server 2017 Dev ... continue reading
Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard is a new set of intrusion prevention capabilities that ships with the Windows 10 Fall Creators Update. The four components of Windows Defender Exploit Guard are designed to lock down the device against a wide variety ... continue reading
Introducing Windows Defender Application Control

Introducing Windows Defender Application Control

Application control is a crucial line of defense for protecting enterprises given today’s threat landscape, and it has an inherent advantage over traditional antivirus solutions. Specifically, application control flips the model from one where all applications are assumed trustworthy by ... continue reading
Hardening the system and maintaining integrity with Windows Defender System Guard

Hardening the system and maintaining integrity with Windows Defender System Guard

One of the things we spend a great deal of time thinking about here at Microsoft is how attackers will attempt to persist and evade detection once they’ve successfully compromised a device. With Windows 10 we’ve made it more difficult ... continue reading
Enabling Surface Laptop keyboard during MDT deployment

Enabling Surface Laptop keyboard during MDT deployment

Hi, my name is Scott McArthur and I am Supportability PM with commercial Surface. Today’s blog will discuss how to enable the keyboard on the new Surface Laptop during a Microsoft Deployment Toolkit deployment. The information in this blog could ... continue reading
Windows Server 2016 Certification Logo

How to Verify Your Hardware is Microsoft Logo Certified

Microsoft has an extensive and active program to certify hardware and software from Microsoft partners.  This certification includes numerous software tests which verify that the hardware or software product works correctly in a Microsoft infrastructure. Components that can be certified ... continue reading
Cluster Validation Command Output

Create a Two-Node Windows Cluster

This article describes the steps to create a Two-Node Windows 2012r2 Cluster to be used for storage services as well as host Hyper-V VMs. Prerequisites Both nodes should be domain joined Prerequisite Roles and Features installed (see Windows Cluster and Storage ... continue reading