Premier Offerings: System Center Configuration Manager and Intune Power BI Dashboard Integration
Introduction As SCCM Engineers we have all been asked at some stage about custom dashboards and reports that are available or that can be created to monitor the SCCM environment, check the status of client activity, client health, deployments or ... continue reading

Spear phishing campaigns—they’re sharper than you think
Even your most security-savvy users may have difficulty identifying honed spear phishing campaigns. Unlike traditional phishing campaigns that are blasted to a large email list in hopes that just one person will bite, advanced spear phishing campaigns are highly targeted ... continue reading

Gartner Names Microsoft a Leader in the 2019 Enterprise Information Archiving (EIA) Magic Quadrant
We often hear from customers about the explosion of data, and the challenge this presents for organizations in remaining compliant and protecting their information. We’ve invested in capabilities across the landscape of information protection and information governance, inclusive of archiving, ... continue reading
What’s the difference between Group Policy and Azure Policy?
To understand the difference between Group Policy and Azure Policy, we need to start with the architecture differences regarding how devices are seen in a Windows Server domain versus in Microsoft Azure. Traditional Group Policy architecture is based on Users ... continue reading

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1
This is the first in a blog series discussing the tools, techniques, and procedures that the Microsoft Detection and Response Team (DART) use to investigate cybersecurity incidents at our customer organizations. Today, we introduce the team and give a brief ... continue reading

Further enhancing security from Microsoft, not just for Microsoft
Legacy infrastructure. Bolted-on security solutions. Application sprawl. Multi-cloud environments. Company data stored across devices and apps. IT and security resource constraints. Uncertainty of where and when the next attack or leak will come, including from the inside. These are just ... continue reading
Co-Management of Windows Updates Workloads
This post is about co-managing the Windows Update policies workload between Configuration Manager and Intune. Overview Organizations today are looking for an integrated endpoint management platform which can ensure all devices whether owned by the business or personally owned stay ... continue reading
Extended Security Updates and Configuration Manager
Support for Windows 7 comes to an end on January 14, 2020, and to remain current and supported, customers need to make the shift to Windows 10. For help planning and deploying Windows 10, Microsoft offers guidance and other resources ... continue reading
Users can now check their sign-in history for unusual activity
Howdy folks, I’m excited to announce the public preview of Azure AD My Sign-Ins—a new feature that allows enterprise users to review their sign-in history to check for any unusual activity. As we discussed in a previous blog post, our ... continue reading
PowerShell Basics: How to Force a Full Password Sync in AzureAD Connect
Before starting this post, the team would like to thank all the contributions shared by the PowerShell community found on Reddit for their support on exploring PowerShell automation capabilities. The outpouring of suggestions and sharing of scripts was awesome and ... continue reading
Highly Scalable Storage

Easily integrate enterprise class storage into your datacenter within minutes.
View Solution