Select Page
The Case of SPNs Breaking Group Policy Application

The Case of SPNs Breaking Group Policy Application

Hello Everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SMC). I’ll share with you something interesting that I came across recently where one of our Enterprise customers had multiple clients where ... continue reading

Testing RPC ports with PowerShell (and yes, it’s as much fun as it sounds!)

Summary: Using PowerShell to identify RPC ports in use by capturing content from Dos Commands like PortQRY.exe We’d like to introduce you today to one of our newest bloggers! It’s a froopingly awesome friend of ours, Joel Vickery, PFE. (did ... continue reading
Installing MIM Synchronization Service with an Offline Spare

Installing MIM Synchronization Service with an Offline Spare

First published on MSDN on Jun 12, 2018Using This Guide:Introduction: This document is intended to be used as an operational build document for the Microsoft Identity Management 2016 Synchronization Server installation. You may perform search and replace on the variables ... continue reading

Core Networking and Internet Standards

Internet Standards Constantly throughout the day, we (and devices on our behalf) all use the Internet: TCP, UDP, HTTP, TLS, DHCP, DNS, and countless other protocols that define the Internet or improve how it runs. How do these foundational protocols ... continue reading
Rename DC to preserve OLD Name and IP address

Rename DC to preserve OLD Name and IP address

One of the needs that arise during an Active Directory upgrade is to have to rename the new Domain Controllers with the Name and IP of the old ones. This should be avoided, application owners should be advised about the ... continue reading
Blog1.png

Monitoring Azure SQL Database with Telegraf

In a prior blog, we had described the Real-time monitoring for Azure SQL Database Managed Instance using the Telegraf SQL plugin. In addition to Managed Instance support, Telegraf now also includes support for Azure SQL Database single databases, and can ... continue reading
Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware

We’ve discussed the challenges that fileless threats pose in security, and how Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) employs advanced strategies to defeat these sophisticated threats. Part of the slyness of fileless malware is their use of living-off-the-land ... continue reading
Anchorman_204Pyxurz.jpg

Controlling write-through behaviors in SMB

Heya folks, Ned here again. In my continuing series on offbeat SMB settings, today I’m going to explain how to control SMB write-through and data consistency in Windows 10 and Windows Server. Background Network protocols like SMB or NFS are ... continue reading

Optimizing Hyper-V Live Migrations on an Hyperconverged Infrastructure

We have been doing some extensive testing in how to best configure Hyper-V live migration to achieve the best performance and highest level of availability. Recommendations: Configure Live Migration to use SMB. This must be performed on all nodes [crayon-5defa35e02d87334377338/] ... continue reading
Tuning Failover Cluster Network Thresholds

Tuning Failover Cluster Network Thresholds

Windows Server Failover Clustering is a high availability platform that is constantly monitoring the network connections and health of the nodes in a cluster. If a node is not reachable over the network, then recovery action is taken to recover ... continue reading