Select Page
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading
Desired State Configuration code: How to troubleshoot the extension

Desired State Configuration code: How to troubleshoot the extension

Hello folks! If you have made it this far, know I think you’re amazing and one of a kind! If you are just tuning in now and would like to see the full blog series daisy chained together, take note ... continue reading

Native Commands in PowerShell – A New Approach

In this two part blog post I’m going to investigate how PowerShell can take better advantage of native executables. In the first post, I’m going to discuss a few of the ways that PowerShell can better incorporate native executables into ... continue reading
Failover Clustering Networking Basics and Fundamentals

Failover Clustering Networking Basics and Fundamentals

My name is John Marlin and I am with the High Availability and Storage Team here and today I want to talk about Failover Clustering and Networking. Networking is a fundamental key with Failover Clustering that sometimes is overlooked but ... continue reading
Anthony_W_0-1592784724912.png

Tagging Azure Resources with a Creator

Hello everyone, my name is Anthony Watherston and I am a Senior Premier Field Engineer in Melbourne Australia. A question was recently raised by a colleague about how we can tag an Azure resource with the name of the person ... continue reading
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint

The increasing pervasiveness of cloud services in today’s work environments, accelerated by a crisis that forced companies around the globe to shift to remote work, is significantly changing how defenders must monitor and protect organizations. Corporate data is spread across ... continue reading
Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 2

Augmenting Azure Advisor Cost Recommendations for Automated Continuous Optimization – Part 2

This is the second post of a series dedicated to the implementation of automated Continuous Optimization with Azure Advisor Cost recommendations. For a contextualization of the solution described in this and following posts, please read the introductory post. Introduction As ... continue reading
Az Update: Azure Arc Server Extension Management, Azure Migrate Updates, and more

Az Update: Azure Arc Server Extension Management, Azure Migrate Updates, and more

Az Update is coming to you a little earlier this week. This week's news includes: New Azure Arc features, Azure Migrate updates, new memory-optimized Azure Virtual Machines, Update Baseline for Windows 10 and more. Be sure to tune in to ... continue reading
Assembly load conflict error message.

Resolving PowerShell Module Assembly Dependency Conflicts

When writing a PowerShell module, especially a binary module (i.e. one written in a language like C# and loaded into PowerShell as an assembly/DLL), it’s natural to take dependencies on other packages or libraries to provide functionality. Taking dependencies on ... continue reading
wlp-disabled.png

Improving concurrency of asynchronous statistics update

Executive summary In Azure SQL Database and Azure SQL Managed Instance, the background process that updates statistics asynchronously can now wait for the schema modification lock on a low priority queue. This improves concurrency for workloads with frequent query plan ... continue reading