
mDNS in the Enterprise
James Kehr here with the Windows networking support team. This article covers details about mDNS and recommended best practices when trying to control the protocol designed to make life easier. Starting with Windows 10 1703 Microsoft has included native support ... continue reading
Troubleshooting HTTP/3 in http.sys
HTTP/3 is a major change to HTTP. It switches away from using TCP as a transport and TLS separately to using QUIC as a transport which has TLS 1.3 or higher built in. These changes mean that migrating from HTTP/2 ... continue reading

On Preferences and Scopes
Progress in PowerShell: a tale of Verbosity and other preferences with lessons in Scopes and Proxies thrown in It started, as these things often do, with someone complaining. In PowerShell Version 7.2 the output of Invoke-WebRequest -Verbose and Invoke-RestMethod -Verbose ... continue reading
Azure VMware Solution (AVS) for VMware Admins – Assessment and Migration
Assessing your environment There are many tools you may or not be familiar with, depending on your background to, assess which workloads are eligible to migrate to Azure VMware Solution. Microsoft offers Azure Migrate where you can download an OVA ... continue reading

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc
As businesses around the world grapple with the growth of an industrialized, organized attacker ecosystem, the need for customers to secure multicloud and hybrid infrastructure and workloads is increasingly urgent. Today, organizations face an attacker ecosystem that is highly economically ... continue reading
Troubleshooting Windows containers apps on Azure Kubernetes Service
Alright, it’s time to bring together everything we learned so far in this series. Previously, we looked at the simplest way to collect logs, how to use the Log Monitor tool, and how to make things simpler with Windows Admin ... continue reading
When is true not equal to true?
When is true not equal to true? An investigation of homoglyphs, their impact on code, and how to detect them. Statement of the problem Here is something I did for fun but stuff like this would be very difficult to ... continue reading

Meet PCI compliance with credit card tokenization
In building and running a business, the safety and security of your and your customers' sensitive information and data is a top priority, especially when storing financial information and processing payments are concerned. The Payment Card Industry Data Security Standard ... continue reading
PowerShell and OpenSSH team investments for 2022
It’s time to discuss the team investments for 2022. For some areas we’ll be completing work we’ve already started, and in others we’ll be beginning on new projects. Executive Order on Cybersecurity One of the areas we’ve already spent significant ... continue reading
Azure AD: Change Management Simplified
Hello Everyone, Rapid change is a growing reality in cloud services. In Azure AD alone, we are making hundreds of changes every year including new feature releases, changes to existing features, as well as deprecations and retirements. We’ve heard from ... continue reading