Select Page

Complying with General Data Protection Regulation (GDPR) on Microsoft Data Platform technologies

This post is authored by Frederico Pravatta Rezende, Senior Product Marketing Manager, CADD & AI. Is your organization prepared for the General Data Protection Regulation (GDPR)? If your company does business in Europe, you’ll need to be aware of this ... continue reading
#Microsoft Azure Security Center Overview #Cloud #Security #HybridCloud #Azure

#Microsoft Azure Security Center Overview #Cloud #Security #HybridCloud #Azure

Microsoft Azure Security Center provides unified security management and advanced threat protection across hybrid cloud workloads. With Security Center, you can apply security policies across your workloads, limit your exposure to threats, and detect and respond to attacks. You can ... continue reading
image_thumb6

Part 2 Ultimate Step to Remote Desktop Services HTML5 QuickStart Deployment #RDS #VDI #RDP #RDmi

Ready for Part 2 of the RDS setup.  As I did already an step by Step Step by Step Server 2016 Remote Desktop Services QuickStart Deployment  #RDS #VDI #RDP #RemoteApp Step by Step Server 2016 Remote Desktop Services QuickStart Deployment ... continue reading
RDmi (RDS modern infrastructure)

Part 1 Ultimate Step to Remote Desktop Services HTML5 on Azure QuickStart Deployment #RDS #S2D #VDI #RDP #RDmi

As I did already an step by Step Step by Step Server 2016 Remote Desktop Services QuickStart Deployment  #RDS #VDI #RDP #RemoteApp Step by Step Server 2016 Remote Desktop Services QuickStart Deployment #RDS #VDI #RDP #RemoteApp that’s Covering all the ... continue reading
Apps and features

Using the OpenSSH Beta in Windows 10 Fall Creators Update and Windows Server 1709

I’m thrilled to share that a Beta OpenSSH client and server daemon are available as a Feature-on-Demand in Windows 10 Fall Creators Update and Windows Server 1709. Since our last update blog, we’ve been working hard on a Win32 port ... continue reading
clip_image002

WNV Deep Dive Part 3 – Capturing and Reading Virtualized Network Traffic

By James Kehr, Networking Support Escalation Engineer There are three primary tools used to capture virtual network traffic in Windows: netsh trace, the PowerShell NetEventPacketCapture module, and Message Analyzer. I won’t focus much on Message Analyzer captures here. Most server ... continue reading

WNV Deep Dive Part 1 – Introduction to Containers and Windows Network Virtualization

By James Kehr, Networking Support Escalation Engineer When I started writing this article it was going to be about Container networking, and nothing but Container networking. As the article progresses I realized there was a lot of useful information that ... continue reading
Microsoft teams up with law enforcement and other partners to disrupt Gamarue (Andromeda)

Microsoft teams up with law enforcement and other partners to disrupt Gamarue (Andromeda)

Today, with help from Microsoft security researchers, law enforcement agencies around the globe, in cooperation with Microsoft Digital Crimes Unit (DCU), announced the disruption of Gamarue, a widely distributed malware that has been used in networks of infected computers collectively ... continue reading
Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Hi, Michele Ferrari here from the Premier Field Engineer-Identity Team in San Francisco here today to do some mix and match about multiple technologies we have within the Azure space. This is the question we’re going to answer today: How ... continue reading
Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks

The threat to information is greater than ever, with data breaches, phishing attacks, and other forms of information theft like point-of-sale malware and ATM hacks becoming all too common in today's threat landscape. Information-stealing trojans are in the same category ... continue reading