Select Page
Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Hi, Michele Ferrari here from the Premier Field Engineer-Identity Team in San Francisco here today to do some mix and match about multiple technologies we have within the Azure space. This is the question we’re going to answer today: How ... continue reading
Protecting Domain Administrative Credentials

Protecting Domain Administrative Credentials

Hello, Paul Bergson back again with today’s topic of preventing your Domain Administrators and other privileged identities from logging into Tier 1 and Tier 2 devices. Credential theft protection is always an important step in protecting the enterprise. While your ... continue reading
Advanced Threat Analytics security research network technical analysis: NotPetya

Advanced Threat Analytics security research network technical analysis: NotPetya

This post is authored by Igal Gofman, Security Researcher, Advanced Threat Analytics. On June 27, 2017 reports on a new variant of Petya (which was later referred to as NotPetya) malware infection began spreading across the globe. It seems the ... continue reading
Securing RDP with IPSec

Securing RDP with IPSec

Hi Everyone, this is Jerry Devore back with a follow-up topic from my previous post on Privileged Administrative Workstations (PAW) which is a hardened device configuration used to protect privileged credentials. In that post, I mentioned that it is possible ... continue reading
Built-In Administrator Account Lockout

Built-In Administrator Account Lockout

Hello, my name is Jason Krause and this is my first time writing a blog post for AskPFEPlat. I am a Platforms PFE here at Microsoft and work primarily in Active Directory and Group Policy. Recently a customer approached me ... continue reading

Microsoft JDBC Driver 6.2 for SQL Server released

This post was authored by Andrea Lam, Program Manager, SQL Server We are happy to announce the full release of the Microsoft JDBC Driver 6.2 for SQL Server. The JDBC Driver provides Java database connectivity from any Java application, application ... continue reading

Troubleshooting Service Manager work item (Incident, Change Request, Service Request) status stuck on “New”

Any time we see newly created work items stuck with a “New” status, it generally means that the Service Manager workflows are not processing or are processing slowly. Monitoring the “Minutes behind” of each workflow can be a useful method ... continue reading
Using Computer Name Aliases in place of DNS CNAME Records

Using Computer Name Aliases in place of DNS CNAME Records

Hi everyone. Graeme Bray here with an article around using Computer Name Aliases instead of DNS CName records. Introduction In the past, we used to set the registry key DisableStrictNameChecking to be able to add a DNS alias to connect ... continue reading
Identity and Rights Management in CSP model – Part 2

Identity and Rights Management in CSP model – Part 2

The CSP program is currently rolling out at scale and many service providers are embarking on the journey to provide management infrastructure services for their customers. In addition to the first article about Identity in CSP, we will show more ... continue reading
1

Hyper-V authentication in Windows Server 2016 for managing remote Hyper-V servers through RSAT

Hello, my name is Ayushie Bhat and I’m a Support Engineer with the Windows Core team. Today, I’m going to talk about the authentication in Windows Server 2016 and discuss the case of creating a VM on a CORE server ... continue reading