Select Page
MichaelKullish_0-1632940746924.png

Microsoft 365 Password Expiration Notification Email Solution for On-Premises AD Accounts

"Hello Again World!" Hi there! Mike Kullish, here. I'm a Microsoft Customer Engineer (CE) based just off the Gulf Coast of Florida with a focus on AD, Hyper-V and DFS, but I try to help customers with anything on the ... continue reading
Dealing with deployment blockers with Bicep

Dealing with deployment blockers with Bicep

Hello Folks! Have you ever had a deployment blocked because the behavior you get from the portal is different than the deployment you get from an Azure Resource Manager (ARM) template or a Bicep deployment? Well, I had that issue ... continue reading
netstat output

Converting string output to objects

In my previous post, I talked about using Crescendo to create a PowerShell module for the vssadmin.exe command in Windows. As I explained, you have to write Output Handler code that parses the output of the command you are using ... continue reading
How to find your Azure Log Analytics agent deployments in preparation for the Azure Monitor agent

How to find your Azure Log Analytics agent deployments in preparation for the Azure Monitor agent

If you have been using the Azure Log Analytics agent to monitor your Microsoft Azure virtual machines, you may have received an email stating that this functionality is being replaced by the Azure Monitor agent: Start using the Azure Monitor ... continue reading
Managing Demo environment with Managed Disk Snapshot

Managing Demo environment with Managed Disk Snapshot

Hello folks, I have been doing some setups for demos on migrating VM to Azure. In good “cooking show” fashion I needed to have my environment ready to be reset so I can run the demo again. Well, instead of ... continue reading
Graphic outlines DART’s containment steps, which cover assessing the scope of the situation and preserving existing systems.

A guide to combatting human-operated ransomware: Part 2

This blog is part two of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our human-operated ransomware docs page ... continue reading
BrunoGabrielli_0-1632424442265.png

Azure Monitor – OMI Vulnerabilities Rapid Check Workbook

Hi folks, As you have heard for sure, Microsoft found, and released fixes for, serious vulnerabilities, which allow for Elevation of Privilege (EoP) and unauthenticated Remote Code Execution (RCE) attacks in the Open Management Infrastructure (OMI). These vulnerabilities are deeply ... continue reading

How to Make Use Of PowerShell Profile Files

Q: I would like to personalize the way that PowerShell works. I have heard that I can use a thing called a profile to do this, but when I try to find information about profiles, I come up blank. There ... continue reading

Parsing JSON with PowerShell

Q: I try to parse my JSON with the handy dandy “ConvertFrom-JSON” cmdlet but it only works in PowerShell 7, not in my good old PowerShell 5.1. How do I get it to work everywhere? A: PS 7 parses JSON ... continue reading

3 trends shaping identity as the center of modern security

I recently returned from Kenya, where I visited our Microsoft Nairobi development center. Like many of you, I’ve mostly worked from home for the past year and more, so it was refreshing to meet members of our global team and ... continue reading