Select Page

It’s that time again: Windows Server Summit 2019!

This blog post was authored by Dianna Marks, Product Marketing Manager, Azure Marketing. Its that time of the year again! Spring is in the air and Windows Server Summit is right around the corner. On May 22nd at Windows Server ... continue reading
Let me Count the Ways: Determining Why the System Process Consumes 100% of a Single CPU Core

Let me Count the Ways: Determining Why the System Process Consumes 100% of a Single CPU Core

NOTE: This blog is going through a specific issue in order to help show the steps involved in troubleshooting this type of issue. The process name(s) referenced in this content, except for System, can be any process, and not just ... continue reading
PAW deployment guide

PAW deployment guide

First published on TECHNET on Apr 30, 2018 After running the PAW TAP program on the solution explained in this blogpost , I received tons of interests and great feedback. While the team is investigating on a plan, a lot ... continue reading

Connect to Virtual Machines (VMs) on PAW

First published on TECHNET on Apr 12, 2018 Continuing the PAW series , this blog post discusses the options to connect to the VMs running on the PAW device. In Windows, you can connect to a locally running VM using: ... continue reading

Building VM template using Assigned Access

First published on TECHNET on Nov 30, 2017 Since it took me a couple of attempts to create VM templates for Azure portal management and Remote Desktop (in order to make them available for the TAP evaluation), I thought it ... continue reading

How to deploy a VM template for PAW

First published on TECHNET on Nov 01, 2017 Continuing with the PAW series, after you followed the previous blog to build the PAW device, you can now deploy PAW VMs on it. There are two types of VMs you can ... continue reading

Shielded VMs – additional considerations when running a guarded fabric

First published on TECHNET on Apr 21, 2017 So you’ve deployed a guarded fabric and your VMs are running happily. Having now reached that perfect steady state, let's have a look at the operational and administrative differences relative to a ... continue reading
Shielded VMs: A conceptual review of the components and steps necessary to deploy a guarded fabric

Shielded VMs: A conceptual review of the components and steps necessary to deploy a guarded fabric

First published on TECHNET on Mar 14, 2017 [This post was authored by Dean Wells, Principal Program Manager on the Windows Server team] If you're anything like me, you probably find it immensely helpful having an end-to-end conceptual view of ... continue reading
Deploying IaaS VM Guest Clusters in Microsoft Azure

Deploying IaaS VM Guest Clusters in Microsoft Azure

First published on MSDN on Feb 14, 2017 Authors: Rob Hindman and Subhasish Bhattacharya, Program Manager, Windows Server In this blog I am going to discuss deployment considerations and scenarios for IaaS VM Guest Clusters in Microsoft Azure. IaaS VM ... continue reading
p2s1.jpg

Step-By-Step: Creating an Azure Point-to-Site VPN

Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We ... continue reading