Select Page

Security baseline for Windows 10 v1803 “Redstone 4” – DRAFT

Microsoft is pleased to announce the draft release of the security configuration baseline settings for the upcoming Windows 10 version 1803, codenamed “Redstone 4.” Please evaluate this proposed baseline and send us your feedback via blog comments below. Download the ... continue reading
Troubleshooting Active Directory Based Activation (ADBA) clients that do not activate

Troubleshooting Active Directory Based Activation (ADBA) clients that do not activate

Hello everyone! My name is Mike Kammer, and I have been a Platforms PFE with Microsoft for just over two years now. I recently helped a customer with deploying Windows Server 2016 in their environment. We took this opportunity to ... continue reading
System Center 1801 Operations Manager – Enhanced log file monitoring for Linux Servers

System Center 1801 Operations Manager – Enhanced log file monitoring for Linux Servers

System Center Operations Manager 1801 has enhanced log file monitoring capabilities for Linux Servers. Operations Manager now supports Fluentd, an Open source Data collector. Customers can also leverage Fluentd capabilities and plugins published by the Fluentd community to get enhanced ... continue reading
The Adventure Begins: Plan and Establish Hybrid Identity with Azure AD Connect (Microsoft Enterprise Mobility and Security)

The Adventure Begins: Plan and Establish Hybrid Identity with Azure AD Connect (Microsoft Enterprise Mobility and Security)

Greetings and salutations fellow Internet travelers! Michael Hildebrand here…as some of you might recall, I used to pen quite a few posts here, but a while back, I changed roles within Microsoft and ‘Hilde – PFE’ was no longer. Since ... continue reading

Retire Those Old Legacy Protocols

Hello Paul Bergson back again, and I wanted to bring up another security topic. There has been a lot of work by enterprises to protect their infrastructure with patching and server hardening, but one area that is often overlooked when ... continue reading
Windows Event Viewer showing the Hyper-V-VMMS Admin log

Looking at the Hyper-V Event Log (January 2018 edition)

Hyper-V has changed over the last few years and so has our event log structure. With that in mind, here is an update of Ben’s original post in 2009 (“Looking at the Hyper-V Event Log”). This post gives a short ... continue reading
Branch office HGS configuration diagram

Improved branch office support for shielded VMs in Windows Server, version 1709

Companies with large branch offices often must make a tradeoff between user experience and security. To increase employee productivity, it may make sense to deploy replicas of certain applications like Active Directory Domain Controllers or file servers in a branch ... continue reading
Use Group Policy Preferences to Manage the Local Administrator Group

Use Group Policy Preferences to Manage the Local Administrator Group

Hello Everyone! Graeme Bray back with you today to talk about how you can reduce the audit and risk surface within your environment. If you can’t tell, Microsoft has taken a strong stance towards security. In a previous life, I ... continue reading
Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware

Windows Defender Exploit Guard is a new set of intrusion prevention capabilities that ships with the Windows 10 Fall Creators Update. The four components of Windows Defender Exploit Guard are designed to lock down the device against a wide variety ... continue reading

Securing Privileged Access for the AD Admin – Part 2

Hello everyone, my name is still David Loder, and I’m still PFE out of Detroit, Michigan. Hopefully you’ve read Securing Privileged Access for the AD Admin – Part 1. If not, go ahead. We’ll wait for you. Now that you’ve ... continue reading