
#Microsoft Azure Hub-Spoke model by Enterprise Design 1 of 4 #Azure #Cloud
Azure Hub-Spoke Architecture Microsoft Azure Hub-Spoke Architecture This Enterprise reference architecture shows how to implement a hub-spoke topology in Azure. The hub is a virtual network (VNet) in Azure that acts as a central point of connectivity to your on-premises ... continue reading

Microsoft System Center Operations Manager Management Pack to configure Operations Management Suite
We have updated Operations Management Suite connection onboarding wizard in System Center Operations Manager to communicate with the new APIs. For configuring new connections to Operations Management Suite with System center Operations Manager, you need to import the product version ... continue reading
Configuring a PowerShell DSC Web Pull Server to use SQL Database
Introduction Hi! Thank you for visiting this blog to find out more about how you can configure a PowerShell DSC Web Pull Server to use an SQL database instead of the “Devices.edb” solution we currently use. Since you made it ... continue reading

Deploying Upgrade Readiness without SCCM
Hello everyone! My name is Paul Fitzgerald and I’m a Platforms PFE. I love learning new things and sharing what I have learned with others. My role as a PFE allows me the opportunity to do just that, and I’ll ... continue reading

#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM
Azure Security Center Standard includes: Hybrid security – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security ... continue reading
Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past
Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading

Automatic Dependency Mapping with Service Map and Live Maps
The following is a special guest blog from Savision Modern enterprise IT infrastructures are becoming increasingly difficult to manage as the deployment of new services and applications continues to grow. Applications tend to rely on many other services and applications ... continue reading
Announcing new Adversary Detection and Compromised Recovery services
This post is authored by Berk Veral, Senior Marketing Communication Manager, Enterprise Cybersecurity Group. Perhaps one of the best-kept secrets within Microsoft cybersecurity services is the Global Incident Response and Recovery team. We affectionately call them the “GIRR” team for ... continue reading