Select Page
Azure Bastion architecture diagram

Customize your secure VM session experience with native client support on Azure Bastion

This blog post has been co-authored by Isabelle Morris, Program Manager, Azure Networking As organizations move their mission-critical workloads to the cloud, connecting to virtual machines (VMs) directly over the public internet is becoming more of a security risk. The ... continue reading
Figure 1 displays different ownership policies for the System Bus and the Session Bus;

Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn

Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could allow an attacker to elevate privileges to root on many Linux desktop endpoints. The vulnerabilities can be chained together to gain root privileges on Linux systems, allowing attackers ... continue reading

Removing Duplicate Device Objects from Configuration Manager with PowerShell

Hello everyone, Chris Vetter Customer Engineer at Microsoft back again to discuss an all-too-common problem and that is Duplicate Device Hostnames in Microsoft Endpoint Manager Configuration Manager (MEMCM). This commonly tends to happen when performing an OSD Image on a ... continue reading
Azure SQL Migration UI Snapshot

Amplify your database development experience with Azure Data Studio

It is that time again! We are excited to bring new and exciting updates to Azure Data Studio. These updates include the general availability of the Azure SQL Migration Extension, the introduction of advanced features to the Table Designer feature ... continue reading
wernerrall_0-1648712981319.png

Move Azure VM to a New Virtual Network Subnet Using Terraform

Introduction Sometimes you create a server in Azure and only find out afterwards you need to change the Virtual Network is resides in. From the official Microsoft Documentation, we learn that this is normally a difficult task and, in some ... continue reading
World map with circles of varying sizes located in several countries regions to indicate the threat's impact.

Dismantling ZLoader: How malicious ads led to disabled security tools and ransomware

As announced today, Microsoft took action against the ZLoader trojan by working with telecommunications providers around the world to disrupt key ZLoader infrastructure. We used our research into this threat to enrich our protection technologies and ensure this infrastructure could ... continue reading
mDNS in the Enterprise

mDNS in the Enterprise

James Kehr here with the Windows networking support team. This article covers details about mDNS and recommended best practices when trying to control the protocol designed to make life easier. Starting with Windows 10 1703 Microsoft has included native support ... continue reading
Troubleshooting HTTP/3 in http.sys

Troubleshooting HTTP/3 in http.sys

HTTP/3 is a major change to HTTP. It switches away from using TCP as a transport and TLS separately to using QUIC as a transport which has TLS 1.3 or higher built in. These changes mean that migrating from HTTP/2 ... continue reading
Screen shot showing the difference if the calling function is a module

On Preferences and Scopes

Progress in PowerShell: a tale of Verbosity and other preferences with lessons in Scopes and Proxies thrown in It started, as these things often do, with someone complaining. In PowerShell Version 7.2 the output of Invoke-WebRequest -Verbose and Invoke-RestMethod -Verbose ... continue reading
Azure VMware Solution (AVS) for VMware Admins - Assessment and Migration

Azure VMware Solution (AVS) for VMware Admins – Assessment and Migration

Assessing your environment There are many tools you may or not be familiar with, depending on your background to, assess which workloads are eligible to migrate to Azure VMware Solution. Microsoft offers Azure Migrate where you can download an OVA ... continue reading