Select Page
Windows Defender ATP machine learning: Detecting new and unusual breach activity

Windows Defender ATP machine learning: Detecting new and unusual breach activity

Microsoft has been investing heavily in next-generation security technologies. These technologies use our ability to consolidate large sets of data and build intelligent systems that learn from that data. These machine learning (ML) systems flag and surface threats that would ... continue reading
clip_image002

Windows Backups Failing with Associated VSS 8193 Errors

Hi, this is Michael Koeppl again. I’m with the Premier Mission Critical (PMC) Team and assisting customers when they hit OS issues in their critical infrastructure, and today I wanted to talk with you about an interesting Windows Backup issue ... continue reading
Screenshot of Service Map, showing app architecture

Build an infrastructure monitoring solution with Service Map

Have you ever been responsible for a flaky application, and wanted to set up an automatic notification when a server, process, or connection isn't there when it should be? Me too! And by using OMS Azure Log Analytics and Service ... continue reading
How to Build Windows Storage Spaces Direct on a Virtual Lab

How to Build Windows Storage Spaces Direct on a Virtual Lab

Step by step instructions to build a Windows Storage Spaces Direct virtual lab on PC. PowerShell script to automate the process.continue reading
Viewing Memory in PowerShell

Viewing Memory in PowerShell

Hello there, this is Benjamin Morgan, and I’m a Premier Field Engineer covering Active Directory and Platforms related topics. This is my first blog post I hope you are all as excited about this as I am! Today I wanted ... continue reading
RDSTWEAKERS.COM

How to: Resize virtual machines in #Azure With #Powershell Multiple or Single virtual machines

With the new VM sizes in Azure you may want to change the Size as you get more VM for less money. but remember the VM will restart! so better fi But changing the VM by hand is a time ... continue reading

ConfigMgr 1702+: Adding a new node (Secondary Replica) to an existing SQL AO AG

Scenario: We already have a working Primary and secondary replica and we know that ConfigMgr 1702 does support an extra replica i.e. 2nd Secondary replica. So we are adding a freshly built node as a secondary replica. The documentation we ... continue reading

ConfigMgr 1702: Adding a new node (Secondary Replica) to an existing SQL AO AG

Scenario We already have a working Primary and secondary replica and we know that ConfigMgr 1702 does support an extra replica i.e. 2nd Secondary replica. So we are adding a freshly built node as a secondary replica. The documentation we have ... continue reading

PowerShell 6.0 Roadmap: CoreCLR, Backwards Compatibility, and More!

As we’ve made progress on open-source PowerShell, it’s time to start talking more in-depth about: different editions of PowerShell PowerShell’s relationship to .NET Core and .NET Standard the future of PowerShell when you might expect to start taking a dependency ... continue reading
Figure 1: Windows Defender ATP detection of Kovter performing process hollowing on regsvr32.exe using mshta.exe

Detecting stealthier cross-process injection techniques with Windows Defender ATP: Process hollowing and atom bombing

Advanced cyberattacks emphasize stealth and persistence: the longer they stay under the radar, the more they can move laterally, exfiltrate data, and cause damage. To avoid detection, attackers are increasingly turning to cross-process injection. Cross-process injection gives attackers the ability ... continue reading