Select Page
Three basic security hygiene tips from Microsoft’s Identity Team

Three basic security hygiene tips from Microsoft’s Identity Team

This post is authored by Alex Weinert from the Identity Division’s Security and Protection Team. Hey there! I want to share three basic hygiene tips for account protection that every organization should consider. Applying these will go a long way ... continue reading

SMB1 Product Clearinghouse

Hi folks, Ned here again. This blog post contains all products requiring SMB1, where the vendor explicitly states this in their own documentation or communications. This list is not complete and you should never treat it as complete; check back ... continue reading
Work Folders updates for Windows 10 version 1703, Android and iOS

Work Folders updates for Windows 10 version 1703, Android and iOS

We’re excited to announce several improvements to the Work Folders clients for Windows 10 version 1703, Android and iOS: Remote users can securely access their files on the Work Folders server using Azure Active Directory Application Proxy Improved single sign ... continue reading
Enable remote access to Work Folders using Azure Active Directory Application Proxy

Enable remote access to Work Folders using Azure Active Directory Application Proxy

We’re excited to announce Work Folders now supports using Azure Active Directory Application Proxy to enable remote users to securely access their files on the Work Folders server. Work Folders supports using VPN, Web Application Proxy (WAP) or a third-party ... continue reading
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading

Guidance on Disabling System Services on Windows Server 2016 with Desktop Experience

[Primary authors: Dan Simon and Nir Ben Zvi] The Windows operating system includes many system services that provide important functionality. Different services have different default startup policies: some are started by default (automatic), some when needed (manual) and some are ... continue reading
(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
60916-01

Configuring Email Notification for Configuration Manager Reports

This blog is a step-by-step example for the configuration of email notification for Configuration Manager Reports and well as for deleting the email subscriptions. We will also cover a bit of background changes (like in database & SSRS Config file) ... continue reading

Troubleshooting ‘Unsupported Cluster Configuration’ errors in Virtual Machine Manager 2012 R2

~ John Clyburn | Senior Consultant Hi everyone, my name is John Clyburn and I’m a senior consultant here at Microsoft. I was recently working at a customer site where we were getting “Unsupported Cluster Configuration” errors in the SCVMM ... continue reading

Artificial intelligence and cybersecurity: The future is here

Although we’re a very long way from putting artificial intelligence (AI) in charge of national defense, the use of AI in cybersecurity isn’t science fiction. The ability of machines to rapidly analyze and respond to the unprecedented quantities of data ... continue reading