Select Page
#Microsoft Azure Hub-Spoke model by Enterprise Design 1 of 4 #Azure #Cloud

#Microsoft Azure Hub-Spoke model by Enterprise Design 1 of 4 #Azure #Cloud

Azure Hub-Spoke Architecture Microsoft Azure Hub-Spoke Architecture This Enterprise reference architecture shows how to implement a hub-spoke topology in Azure. The hub is a virtual network (VNet) in Azure that acts as a central point of connectivity to your on-premises ... continue reading
Microsoft System Center Operations Manager Management Pack to configure Operations Management Suite

Microsoft System Center Operations Manager Management Pack to configure Operations Management Suite

We have updated Operations Management Suite connection onboarding wizard in System Center Operations Manager to communicate with the new APIs. For configuring new connections to Operations Management Suite with System center Operations Manager, you need to import the product version ... continue reading

Configuring a PowerShell DSC Web Pull Server to use SQL Database

Introduction Hi! Thank you for visiting this blog to find out more about how you can configure a PowerShell DSC Web Pull Server to use an SQL database instead of the “Devices.edb” solution we currently use. Since you made it ... continue reading
Deploying Upgrade Readiness without SCCM

Deploying Upgrade Readiness without SCCM

Hello everyone! My name is Paul Fitzgerald and I’m a Platforms PFE. I love learning new things and sharing what I have learned with others. My role as a PFE allows me the opportunity to do just that, and I’ll ... continue reading
#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM

#Microsoft Azure #Security Center Standard for Hybrid Security #Azure #Cloud #SIEM

Azure Security Center Standard includes: Hybrid security – Get a unified view of security across all of your on-premises and cloud workloads. Apply security policies and continuously assess the security of your hybrid cloud workloads to ensure compliance with security ... continue reading

Use Windows Information Protection (WIP) to help make accidental data leakage a thing of the past

Have you always wished you could have mobile application management (MAM) on Windows? Now you can! Windows Information Protection (WIP) is an out-of-the box data leakage prevention feature for Windows 10 that can automatically apply protection for work files and ... continue reading
Automatic Dependency Mapping with Service Map and Live Maps

Automatic Dependency Mapping with Service Map and Live Maps

The following is a special guest blog from Savision Modern enterprise IT infrastructures are becoming increasingly difficult to manage as the deployment of new services and applications continues to grow. Applications tend to rely on many other services and applications ... continue reading

Announcing new Adversary Detection and Compromised Recovery services

This post is authored by Berk Veral, Senior Marketing Communication Manager, Enterprise Cybersecurity Group. Perhaps one of the best-kept secrets within Microsoft cybersecurity services is the Global Incident Response and Recovery team. We affectionately call them the “GIRR” team for ... continue reading