Select Page
Screenshot of label analytics in the Microsoft 365 compliance tenant dashboard.

Data governance and retention in your Microsoft 365 tenant—a secure and highly capable solution

Data governance has relied on transferring data to a third-party for hosting an archive service. Emails, documents, chat logs, and third-party data (Bloomberg, Facebook, LinkedIn, etc.) must be saved in a way that it can’t be changed and won’t be ... continue reading
Image showing "Signers" using in the credential dumping tool signed using a stolen Whizzimo, LLC certificate.

GALLIUM: Targeting global telecom

Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers. When Microsoft customers have been targeted by this activity, we notified them directly with the relevant information they need ... continue reading
The "This Update is not Applicable to this Computer" Anomaly

The “This Update is not Applicable to this Computer” Anomaly

Hello everyone! My name is Mike Kammer, and I'm a Platforms PFE with Microsoft, dealing with all versions of Windows Server, and other duties as assigned. Sometimes those duties are fun, and everything works perfectly, like playing with kittens or ... continue reading

Five essential skills for today’s database administrators

DevOps, the cloud, and new database technologies mean our jobs as database administrators (DBAs) are changing at an ever-faster pace. If you're fascinated by data and all the things you can do with it, it's a thrilling time to be ... continue reading

Guarding against supply chain attacks—Part 1: The big picture

Every day, somewhere in the world, governments, businesses, educational organizations, and individuals are hacked. Precious data is stolen or held for ransom, and the wheels of “business-as-usual” grind to a halt. These criminal acts are expected to cost more than ... continue reading
How does the PXE boot process work?

How does the PXE boot process work?

Within the IT department imaging devices for end users is something that we’ve probably all had to do at some point, either manually or with an automation product such as Windows Deployment Services (WDS), Microsoft Deployment Toolkit (MDT) or System ... continue reading
System Center Configuration Manager – All Servers and All Workstations Collections with ProductType

System Center Configuration Manager – All Servers and All Workstations Collections with ProductType

First published on TECHNET on May 10, 2016Authored by Cameron CoxWhen I go out to customers, I always like to see how the top collections are populated (All Servers or All Workstations).This is something most customers do immediately after setting ... continue reading
Collection Evaluation - One tool, One Report

Collection Evaluation – One tool, One Report

First published on TECHNET on Jul 31, 2015Authored by Santos MartinezHello, ConfigNinja here writing you about Collection Evaluation and information on how to review the current collection performance. Collection performance is often one of those questions I get when working ... continue reading

Visual Studio Code: Develop PySpark jobs for SQL Server 2019 Big Data Clusters

Today were announcing the support in Visual Studio Code for SQL Server 2019 Big Data Clusters PySpark development and query submission. It provides complementary capabilities to Azure Data Studio for data engineers to author and productionize PySpark jobs after data ... continue reading
Azure Blueprint configuration screen.

New PCI DSS Azure Blueprint makes compliance simpler

I’m excited to announce our second Azure Blueprint for an important compliance standard with the release of the PCI-DSS v3.2.1 blueprint. The new blueprint maps a core set of policies for Payment Card Industry (PCI) Data Security Standards (DSS) compliance ... continue reading