Select Page

Install of SharePoint Foundation 2013 SP1 for use with FIM / MIM

First published on MSDN on Jun 01, 2018 This document is intended to be used as an operational build document for the installation of SharePoint Foundation 2013 SP1 for use with Forefront Identity Manager 2010 R2 or Microsoft Identity Management ... continue reading

FIM / MIM Preparation Script Version 1

First published on MSDN on Nov 10, 2015 Updated 23 September 2016 MIMPrepScript.zip For the past few weeks my colleague and I who co author this blog have been working on a script to assist in the preparation and prerequisites ... continue reading
Unify your data lakes with HDFS tiering in SQL Server Big Data Clusters

Unify your data lakes with HDFS tiering in SQL Server Big Data Clusters

As the volume and variety of data has risen, it has become more common to store the data in disparate and diverse data sources. A challenge many organizations face today is how to gain insights from all of their data ... continue reading
clipboard_image_0.png

What are the Differences Between Azure Active Directory and Azure Active Directory Domain Services?

I met with some customers last week, and we had a great conversation about Active Directory and the differences between all the flavours available to them when adopting a hybrid posture. More specifically, what are the difference between: Azure Active ... continue reading

Identifying Stale Cluster Computer Objects

On a Windows Server Failover Cluster for each Network Name resource there is a logical name which has a corresponding computer object (CO) created. The computer object associated with the Cluster Name this is commonly referred to as the Cluster ... continue reading
1 Azure AD and F5.png

Azure AD + F5—helping you secure all your applications

Howdy folks, We often hear from our customers about the complexities around providing seamless and secure user access to their applications—from cloud SaaS applications to legacy on-premises applications. Based on your feedback, we’ve worked to securely connect any app, on ... continue reading
A diagram looking at the responsibilities of the customer versus the service they are using.

SAP on Azure Architecture – Designing for security

This blog post was contributed to by Chin Lai The, Technical Specialist, SAP on Azure. This is the first in a four-part blog series on designing a great SAP on Azure Architecture, and will focus on designing for security. Great ... continue reading
Understanding the Repair Active Directory Object Recovery Action

Understanding the Repair Active Directory Object Recovery Action

First published on MSDN on Dec 13, 2013 One of the responsibilities of cluster Network Name resource is to rotate the password of the computer object in Active Directory associated with it. When the Network Name resource is online, it ... continue reading

25 reasons to choose Azure Stack HCI

This blog post was authored by Dianna Marks, Product Marketing Manager, Windows Server Marketing. At the Windows Server Summit in May, Cosmos Darwin and Greg Cusanza from the Windows Server team presented a lightning round all about hyperconverged infrastructure (HCI) ... continue reading

Security baseline (FINAL) for Windows 10 v1903 and Windows Server v1903

Microsoft is pleased to announce the final release of the security configuration baseline settings for Windows 10 version 1903 (a.k.a., “19H1”), and for Windows Server version 1903. Download the content from the Microsoft Security Compliance Toolkit (click Download and select ... continue reading