Select Page
Diagram of methods

Reverse Desired State Configuration: How it works

Nik Charlebois is a Premier Field Engineer based out of Canada. He is the author of several books on SharePoint automation, and he writes blog posts on a regular basis about all things PowerShell. You can find out more about ... continue reading

Move away from passwords, deploy Windows Hello. Today!

Something we understood from the very beginning with Windows Hello for Business is our customers would approach Windows 10 in a series of phases. The first phase is to simply deploy the platform itself. From there, additional phases would follow ... continue reading
Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter. Join Lex ... continue reading
Inside the #Microsoft Operations Management Suite E-book #MSOMS #Azure by #MVPbuzz #MSFT

Inside the #Microsoft Operations Management Suite E-book #MSOMS #Azure by #MVPbuzz #MSFT

Description: This is the updated release (v2.0) of “Inside the Microsoft Operations Management Suite”, an end-to-end deep dive into the full range of Microsoft Operations Management Suite (OMS) features and functionality, complete with downloadable sample scripts. The chapter list in ... continue reading
Microsoft’s perspective on cyber resilience

Microsoft’s perspective on cyber resilience

This post is authored by Ann Johnson, Vice President, Enterprise Cybersecurity Group. In the wake of recent ransomware outbreaks, I wanted to understand how impacted firms have evolved their thinking on cyber resilience planning and implementation. I asked the Detection ... continue reading
Azure Recovery Services Vault Management – performing a vault swap

Azure Recovery Services Vault Management – performing a vault swap

In this blog post I will address some of the questions we’re receiving from customers regarding Azure Backup and Recovery Services vaults. We will focus on one of the most common Azure Backup / Recovery Services Vault management scenarios, which ... continue reading
ORCA_Banner

(Part 3) Microsoft Operations Management Suite – Windows Server 2016

In this third part in a three part video series on Microsoft's Operations Management Suite (OMS) we are going to cover security, compliance, protection and recovery capabilities that OMS delivers. Find out how OMS leverages machine learning algorithms to detect ... continue reading
Monitoring Large DPM Deployments with SCOM

Monitoring Large DPM Deployments with SCOM

DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. One way to monitor the DPM servers centrally is using SCOM. In this blog, our guest, John Joyner, talks about leveraging Central Console ... continue reading
Windows 10 platform resilience against the Petya ransomware attack

Windows 10 platform resilience against the Petya ransomware attack

The Petya ransomware attack on June 27, 2017 (which we analyzed in-depth in this blog) may have been perceived as an outbreak worse than last month's WannaCrypt (also known as WannaCry) attack. After all, it uses the same SMB exploit ... continue reading
Migration Datacenter to Azure – Part 2

Migration Datacenter to Azure – Part 2

This post provides an overview of key technical considerations, actionable recommendations and common pitfalls related to migration of workloads from an on-premises datacenter to Microsoft Azure. The business related considerations were addressed within the Migrating Datacenter to Azure – Part 1 ... continue reading