Select Page
Chart showing vulnerability, patch release, and outbreak. Vulnerability: MS08-067; Patch release: October 23, 2008; Outbreak: late December 2008. Vulnerability: MS17-010; Patch release: March 14, 2017; Outbreak: May 12, 2017. Vulnerability: CVE-2019-0708; Patch release: May 13, 2019; Outbreak column shows three question marks.

Protect against BlueKeep

Worms are the cause of many cyber headaches. They can easily replicate themselves to spread malicious malware to other computers in your network. As the field responders providing Microsoft enterprise customers with onsite assistance to serious cybersecurity threats, our Detection ... continue reading
expressroute

Building Resilient ExpressRoute Connectivity for Business Continuity and Disaster Recovery

As more and more organizations adopt Azure for their business-critical workloads, the connectivity between organizations’ on-premises networks and Microsoft becomes crucial. ExpressRoute provides the private connectivity between on-premises networks and Microsoft. By default, an ExpressRoute circuit provides redundant network connections ... continue reading
How to Manage DHCP using PowerShell

How to Manage DHCP using PowerShell

Most organizations are already going to have DHCP deployed on their servers. If you have a new server on which you want to deploy DHCP, just run the PowerShell command: Install-WindowsFeature DHCP -IncludeManagementTools Once you’ve installed a DHCP server on ... continue reading
Snapshot of YouTube video with play button for Run VMware in Azure tutorial

Moving your VMware resources to Azure is easier than ever

Back in April we announced the Azure VMware Solution to deliver a comprehensive VMware environment allowing you to run native VMware-based workloads on Azure. It’s a fully managed platform as a service (PaaS) that includes vSphere, vCenter, vSAN, NSX-T, and ... continue reading
An image depicting how VNet peering connects VNets.

Choosing between Azure VNet Peering and VNet Gateways

As customers adopt Azure and the cloud, they need fast, private, and secure connectivity across regions and Azure Virtual Networks (VNets). Based on the type of workload, customer needs vary. For example, if you want to ensure data replication across ... continue reading
An image showing the Overview tab in Azure Security Center.

Announcing general availability for the Azure Security Center for IoT

As organizations pursue digital transformation by connecting vital equipment or creating new connected products, IoT deployments will get bigger and more common. In fact, IDC forecasts that IoT will continue to grow at double digit rates until IoT spending surpasses ... continue reading
New Pre-Integrated Apps Available in Azure AD | July 2019

New Pre-Integrated Apps Available in Azure AD | July 2019

Last week we had the opportunity to engage with thousands of partners at Microsoft Inspire, our annual partner conference. We had the privilege to engage with several independent software vendors (ISVs) about deepening integrations with Azure AD so our joint ... continue reading
FourCores on MSDN.png

Check out what’s new in June 2019 version of Azure SQL Database managed instance

In June 2019 Azure SQL Database offered a major refreshed release of Azure SQL Database managed instance (SQL MI), adding a rich set of innovations, complementing the Generally Available version of this product. These enhancements result in SQL MI becoming ... continue reading
Frontline worker in coffee industry using Azure IoT Central.

How one Azure IoT partner is building connected experiences

We recently spent time with Mesh Systems, a Microsoft Gold Cloud platform partner based in Carmel, Indiana, to understand what a day in the life of an Azure IoT partner looks like. They shared some of their recent IoT customer ... continue reading

Smarter edge, smarter world: Discover the autonomous edge

If you want to solve a business problem using a computer, you have to connect to it. The furthest point at which you can connect the “edge” has always been a major frontier of computing. In the 1950s, the edge ... continue reading