Select Page
Network ATC: What's coming in Azure Stack HCI 22H2

Network ATC: What's coming in Azure Stack HCI 22H2

When we first released Network ATC, we greatly simplified the deployment and on-going management of host networking in Azure Stack HCI. Whether it was the simple yet powerful deployment experience, a “that was easy” cluster expansion process, or increased reliability ... continue reading
PaddyDamodharan_14-1660355299530.png

Modernizing Endpoint Management – Encryption – Part 2

Introduction: In part 1, we saw how to use MEM portal to view and recover Bitlocker recovery keys for ConfigMgr clients that are tenant attached. In part 2 of this blog, we will see how to migrate Bitlocker keys to ... continue reading
A screenshot of a LinkedIn profile identified for fraudulent behavior. The fake profile uses the name Westley Dyck, who allegedly identifies as a research assistant.

Disrupting SEABORGIUM’s ongoing phishing operations

The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM, an actor Microsoft has tracked since 2017. SEABORGIUM is a threat actor that originates from Russia, with objectives and victimology that align closely ... continue reading
GIF showing a developer deploying a new Dev Box from a Dev Box pool.

Announcing Microsoft Dev Box preview

Many IT organizations must choose between giving developers the flexibility they need to be productive and keeping developer workstations managed and secure. Supply chain challenges have led to developers waiting weeks or months to get the hardware they need, forcing ... continue reading
Microsoft Purview form showing the Name, Azure subscription.

Microsoft Purview access policies for SQL Server 2022

Part of the SQL Server 2022 blog series.OverviewMicrosoft Purview is a family of data governance, risk, and compliance solutions that help organizations:Gain visibility into data assets across your organization. Data assets can be across data centers, multicloud, and software as ... continue reading
Planning the Monitoring of my hybrid environment.

Planning the Monitoring of my hybrid environment.

Hello folks, By now you may have read that I’ve rebuilt my demo environment to look like what a typical hybrid environment would look like. I did it slowly without having to rip and replace everything in my on-prem environment ... continue reading
PsRule: Introduction to Infrastructure As Code (IAC) Testing

PsRule: Introduction to Infrastructure As Code (IAC) Testing

Introduction One of the fundamental ideas of DevOps is to combine the best practices from the infrastructure and development worlds, to learn from each other. This means applying the concept of testing to our Infrastructure As Code (Bicep, Arm, etc) ... continue reading
Azure Virtual Machines Automation - Deployment

Azure Virtual Machines Automation – Deployment

Welcome to this series where you will learn the various best practices for deploying Azure Virtual Machines and how to manage them at scale. To get started, we are going to take a look at various deployment options; how you ... continue reading
System architecture for mitigating impact of ransomware. Healthy servers receive trusted beacons from the cloud. An attack on near and far edge servers causes the cloud to stop issuing trusted beacons. In their absence, servers automatically reimage themselves kicking ransomware off the platform.

Security for next generation telecommunication networks

Almost two years ago, the National Defense Science Board invited me to participate in the Summer Study 2020 Panel, “Protecting the Global Information Infrastructure.” They requested that I brief them on the evolution of the global communications infrastructure connecting all ... continue reading
Everything you need to know about containerizing existing apps on Windows

Everything you need to know about containerizing existing apps on Windows

It’s been almost 7 years since we released the first version of Windows containers on Windows Server 2016. I was there to watch the launch and remember even the early adopter versions. So much has changed since then. However, there’s ... continue reading