Select Page
How To Install Log Analytics Gateway Using Load Balancers In Azure

How To Install Log Analytics Gateway Using Load Balancers In Azure

Hello everyone, after a long time, I am back with a new post. Today I will drive you through the configuration of a load balanced Log Analytics Gateway (formerly OMS Gateway and briefly referred below as LAGW) installed on Azure ... continue reading

Install ConfigMgr CB 1902 using PowerShell

Introduction The document outlines the steps required to install SCCM CB 1902 with SQL 2017 using PowerShell. These steps can be used on a disconnected network. The scripts included in this document can also be added to MDT to automate ... continue reading
Image showing "Signers" using in the credential dumping tool signed using a stolen Whizzimo, LLC certificate.

GALLIUM: Targeting global telecom

Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers. When Microsoft customers have been targeted by this activity, we notified them directly with the relevant information they need ... continue reading
The Case of SPNs Breaking Group Policy Application

The Case of SPNs Breaking Group Policy Application

Hello Everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SMC). I’ll share with you something interesting that I came across recently where one of our Enterprise customers had multiple clients where ... continue reading

Testing RPC ports with PowerShell (and yes, it’s as much fun as it sounds!)

Summary: Using PowerShell to identify RPC ports in use by capturing content from Dos Commands like PortQRY.exe We’d like to introduce you today to one of our newest bloggers! It’s a froopingly awesome friend of ours, Joel Vickery, PFE. (did ... continue reading

Installing MIM Synchronization Service with an Offline Spare

First published on MSDN on Jun 12, 2018 Using This Guide: Introduction: This document is intended to be used as an operational build document for the Microsoft Identity Management 2016 Synchronization Server installation. You may perform search and replace on ... continue reading

Core Networking and Internet Standards

Internet Standards Constantly throughout the day, we (and devices on our behalf) all use the Internet: TCP, UDP, HTTP, TLS, DHCP, DNS, and countless other protocols that define the Internet or improve how it runs. How do these foundational protocols ... continue reading
Rename DC to preserve OLD Name and IP address

Rename DC to preserve OLD Name and IP address

One of the needs that arise during an Active Directory upgrade is to have to rename the new Domain Controllers with the Name and IP of the old ones. This should be avoided, application owners should be advised about the ... continue reading
Blog1.png

Monitoring Azure SQL Database with Telegraf

In a prior blog, we had described the Real-time monitoring for Azure SQL Database Managed Instance using the Telegraf SQL plugin. In addition to Managed Instance support, Telegraf now also includes support for Azure SQL Database single databases, and can ... continue reading
Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

We’ve discussed the challenges that fileless threats pose in security, and how Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) employs advanced strategies to defeat these sophisticated threats. Part of the slyness of fileless malware is their use of living-off-the-land ... continue reading