Select Page
Diagram of methods

Reverse Desired State Configuration: How it works

Nik Charlebois is a Premier Field Engineer based out of Canada. He is the author of several books on SharePoint automation, and he writes blog posts on a regular basis about all things PowerShell. You can find out more about ... continue reading

Move away from passwords, deploy Windows Hello. Today!

Something we understood from the very beginning with Windows Hello for Business is our customers would approach Windows 10 in a series of phases. The first phase is to simply deploy the platform itself. From there, additional phases would follow ... continue reading
Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter. Join Lex ... continue reading
Inside the #Microsoft Operations Management Suite E-book #MSOMS #Azure by #MVPbuzz #MSFT

Inside the #Microsoft Operations Management Suite E-book #MSOMS #Azure by #MVPbuzz #MSFT

Description: This is the updated release (v2.0) of “Inside the Microsoft Operations Management Suite”, an end-to-end deep dive into the full range of Microsoft Operations Management Suite (OMS) features and functionality, complete with downloadable sample scripts. The chapter list in ... continue reading
Microsoft’s perspective on cyber resilience

Microsoft’s perspective on cyber resilience

This post is authored by Ann Johnson, Vice President, Enterprise Cybersecurity Group. In the wake of recent ransomware outbreaks, I wanted to understand how impacted firms have evolved their thinking on cyber resilience planning and implementation. I asked the Detection ... continue reading

Announcing new Adversary Detection and Compromised Recovery services

This post is authored by Berk Veral, Senior Marketing Communication Manager, Enterprise Cybersecurity Group. Perhaps one of the best-kept secrets within Microsoft cybersecurity services is the Global Incident Response and Recovery team. We affectionately call them the “GIRR” team for ... continue reading