Select Page
PowerBI_Assessment.png

Premier Offerings: Power BI Assessment

Introduction In this series of articles, we will present Premier Services Offerings around Power BI. In this one we will present the Power BI Assessment. Are you sure that your Power BI tenant follows Microsoft Best Practices? Are you noticing ... continue reading
Errors on a pull request blocking a merge

Getting Started with Testing Infrastructure Code

Hi, my name is Bernie White, I am a Premier Field Engineer at Microsoft. Today I’d like to show you how you can get started with testing infrastructure code using an open source project called PSRule within Azure Pipelines. Within ... continue reading
How to Defend Users from Interception Attacks via SMB Client Defense

How to Defend Users from Interception Attacks via SMB Client Defense

Hey folks, Ned here again with another guest post. Today we discuss hardening the SMB protocol in Windows against interception attacks, previously referred to as “Man-in-the-Middle” attacks. As you know, interception attacks involve manipulating communications between client and server. An ... continue reading
How you can contribute to Open Source Projects on GitHub

How you can contribute to Open Source Projects on GitHub

Have you ever wanted to help the community but then started to think: "It won't make a difference anyway", or "everyone knows that already...". In this blog post, I'll explain why your contribution is of great value, and how contributing ... continue reading

PowerShell Basics: How to check if MFA is enabled in Azure and Office 365

Security governance has been top of mind for most since the onslaught of human malware has the masses working from home. This comes with new concerns surrounding identity protection and actually proving that remote users are who they say they ... continue reading
image002.png

Endpoint Configuration Manager – Site Server High Availability

Overview Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading
Desired State Configuration code: How to troubleshoot the extension

Desired State Configuration code: How to troubleshoot the extension

Hello folks! If you have made it this far, know I think you’re amazing and one of a kind! If you are just tuning in now and would like to see the full blog series daisy chained together, take note ... continue reading

Native Commands in PowerShell – A New Approach

In this two part blog post I’m going to investigate how PowerShell can take better advantage of native executables. In the first post, I’m going to discuss a few of the ways that PowerShell can better incorporate native executables into ... continue reading
Failover Clustering Networking Basics and Fundamentals

Failover Clustering Networking Basics and Fundamentals

My name is John Marlin and I am with the High Availability and Storage Team here and today I want to talk about Failover Clustering and Networking. Networking is a fundamental key with Failover Clustering that sometimes is overlooked but ... continue reading