Select Page

Use Windows Server 2016 to secure a jump server

First published on TECHNET on Feb 02, 2017 When talking to customers about the security features in Windows Server 2016, a common question keeps coming up, how do I secure my jump server? Recently, I worked with a Microsoft internal ... continue reading

Step by step – Creating Shielded VMs without VMM

First published on TECHNET on Jun 06, 2016 Hi, I’m Jane, one of the newest members of the Windows Server Security Product Team. My very first hands-on experience is to deploy Shielded VMs with the minimum amount of hardware. It ... continue reading
Step by Step - Creating Shielded VMs

Step by Step – Creating Shielded VMs

First published on TECHNET on Mar 23, 2016 [This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security Product Team] In this blog, we’ll walk through the steps necessary to create a shielded VM and ... continue reading
p2s1.jpg

Step-By-Step: Creating an Azure Point-to-Site VPN

Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We ... continue reading
Windows_Server_2019_OpenSSH.jpg

Installing and Configuring OpenSSH on Windows Server 2019

While I’ve never had a problem with PowerShell remoting for remote command line interaction with Windows Server, I’ve often found that it isn’t something that many systems administrators, especially those that work in heterogeneous environments, are entirely at ease with ... continue reading
Managing and Working with #Azure Network Security Groups (NSG) #Security #IaC #AzureDevOps

Managing and Working with #Azure Network Security Groups (NSG) #Security #IaC #AzureDevOps

Microsoft Azure Network Security Group (NSG) When you are implementing your Microsoft Azure Design like a HUB-Spoke model you have to deal with security of your Azure environment (Virtual Datacenter). One of them are Network Security Groups to protect your ... continue reading
How to Run scripts on Azure Virtual Machines with the Run Command

How to Run scripts on Azure Virtual Machines with the Run Command

I often need to run a simple task or retrieve information from an Azure VM. Most of the time I want to do so without creating an RDP or SSH session, exposing a WinRM or SSH port, and in some ... continue reading
Notes from the Field: Microsoft SDN Software Load Balancers

Notes from the Field: Microsoft SDN Software Load Balancers

Kyle Bisnett and Bill Curtis here. We are two Software Defined Network Blackbelts and Premier Field Engineers at Microsoft and specialize in Hybrid Cloud technologies, which includes Cloud Platform System, Azure Stack and WSSD/SDDC. Most importantly, we ensure it’s easy ... continue reading

Step-By-Step: Enabling Hyper-V for use on Windows 10

Virtualization provides a plethora of solutions from making the most of an organization’s hardware investment to running specific applications in other OS offerings. Windows 8 was the first Windows client operating system to include hardware virtualization support natively. Using the ... continue reading
Building Zero Trust networks with Microsoft 365

Building Zero Trust networks with Microsoft 365

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own ... continue reading