Select Page
How to Troubleshoot Create Cluster Failures

How to Troubleshoot Create Cluster Failures

First published on MSDN on May 07, 2012 In this blog, I will outline the steps in order to troubleshoot “Create Cluster” failures with Windows Server 2012 or later Failover Clustering. Step 1: Run the Cluster Validation Tool The cluster ... continue reading
INTUNE - Intune and Autopilot Part 4 - Enroll your first device

INTUNE – Intune and Autopilot Part 4 – Enroll your first device

First published on MSDN on Nov 27, 2018 In the last blog posts, INTUNE – Intune and Autopilot Part 1 – The Blueprint INTUNE – Intune and Autopilot Part 2 – Setting up your environment Intune and Autopilot Part 3 ... continue reading
Full software defined infrastructure in the Azure Stack portal

Azure Stack IaaS – part one

This blog post was co-authored by Daniel Savage, Principal Program Manager, Azure Stack and Tiberiu Radu, Senior Program Manager, Azure Stack. Azure Stack at its core is an Infrastructure-as-a-Service (IaaS) platform When we discuss Azure Stack with our customers, they ... continue reading
Flowchart example of a hybrid network that extends an on-premises network to Azure

Best practices to consider before deploying a network virtual appliance

A network virtual appliance (NVA) is a virtual appliance primarily focused on network functions virtualization. A typical network virtual appliance involves various layers four to seven functions like firewall, WAN optimizer, application delivery controllers, routers, load balancers, IDS/IPS, proxies, SD-WAN ... continue reading
Step-by-Step: How to configure a SQL Server 2008 R2 Failover Cluster Instance in Azure

Step-by-Step: How to configure a SQL Server 2008 R2 Failover Cluster Instance in Azure

Introduction If you are reading this article you probably are still using SQL Server 2008/2008 R2 and want to take advantage of the extended security updates that Microsoft is offering if you move your SQL Server 2008/2008 R2 into Azure ... continue reading
p2s1.jpg

Step-By-Step: Creating an Azure Point-to-Site VPN

Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We ... continue reading
XentIT Cloud Security Stack for Azure flowchart

Security for healthcare through vigilant agents and virtual patching

Healthcare organizations depend on data-driven decisions. To enable better decisions and better health outcomes, healthcare organizations are moving to the cloud. There, the latest advances in artificial intelligence, machine learning, and analytics can be more easily tested and implemented. For ... continue reading
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, ... continue reading
PowerShell Basics: Finding Your Way in the PowerShell Console

PowerShell Basics: Finding Your Way in the PowerShell Console

For me, one of the most important features of PowerShell is the ability to find all the answers you need in the shell. From the early days, PowerShell has included commands for finding cmdlets and functions within the shell including ... continue reading
image

How to Protect your #Azure resources from Distributed Denial of Service #DDoS attacks #Cloud #SDN #VNET #Security #Alerts #Analytics

Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application’s resources, making the application unavailable to legitimate ... continue reading