Select Page
New tech support scam launches communication or phone call app

New tech support scam launches communication or phone call app

A new tech support scam technique streamlines the entire scam experience, leaving potential victims only one click or tap away from speaking with a scammer. We recently found a new tech support scam website that opens your default communication or ... continue reading
Demystifying Schannel

Demystifying Schannel

Hello all! Nathan Penn here to help with some of those pesky security questions that have lingered for years. Recently I have been fielding several questions on “How do I make sure that I am only using the TLS 1.2 ... continue reading
Microsoft Azure #CloudShell Overview with #Bash CLI 2.0 and #Powershell #Azure #DevOps

Microsoft Azure #CloudShell Overview with #Bash CLI 2.0 and #Powershell #Azure #DevOps

Azure Powershell in the Portal Azure Cloud Shell is an interactive, browser-accessible shell for managing Azure resources. It gives you the flexibility of choosing the shell experience that best suits the way you work. Linux users can opt for a ... continue reading

How to create a VM template for PAW

Continuing with the PAW series, after you followed the previous blog to build the PAW device, you can now deploy PAW VMs on it. There are two types of VMs you can create: Desktop VM: this is a standard VM, ... continue reading
Diagram of schedule for updates

Azure Log Analytics workspace upgrades in progress

Many of you are currently using Azure Log Analytics to monitor your environments for availability and performance. We want to let you know that we're rolling out new enhancements and changes for Log Analytics, including a new query language. To ... continue reading
Privileged Access Workstation (PAW)

Privileged Access Workstation (PAW)

At Ignite conference last month, Dean and I presented a session on PAW. Originally we were planning to just talk about the concept of PAW and how it is deployed in Microsoft. A week before the conference, we decide to ... continue reading
policy to disable dual scan

Using ConfigMgr With Windows 10 WUfB Deferral Policies

Important: Configuration Manager current branch version 1706 is needed for any ConfigMgr environment using WUfB deferral policies. ConfigMgr client version 1702 will periodically delete all WUfB deferral policies, if configured. This could lead to unintended results. As you are probably ... continue reading

Frequently Asked Questions About HGS Certificates

The Host Guardian Service uses public key cryptography extensively to protect shielded VMs from attackers. Any time certificates with public-private key pairs come into play, there are bound to be many questions about how to properly set up and protect ... continue reading
Diagram of solution components

Azure Log Analytics Container Monitoring solution for Linux Service Fabric

Hello all, this is Keiko, Program Manager from the Log Analytics team. We are excited to extend our monitoring capabilities to Service Fabric containers running on Linux servers. Service Fabric on Linux as a container orchestrator is now generally available ... continue reading

New System Center Virtual Machine Manager Analytics solution

In System Center Virtual Machine Manager (VMM), administrators often monitor detailed job status to learn about the health and performance of operations and to diagnose any issues with the hosts or virtual machines. To improve this experience, we are delighted ... continue reading