Select Page

Microsoft raises the security standard for next major Windows Server release

Server security and platform Integrity are critical requirements in today's datacenter, edge, and cloud environments. Many Windows Server customers have relied on built-in security capabilities such as Secure boot and BitLocker to protect their infrastructure. These capabilities are enhanced when ... continue reading
AMD Nested Support showing a VM running on a VM on AMD Hardware

AMD Nested Virtualization Support

AMD Nested Support showing a VM running on a VM on AMD Hardware Nested Virtualization is not a new idea. In fact, we announced our first preview of Nested Virtualization running on Windows way back in 2015. From that Windows ... continue reading

VMware Workstation and Hyper-V

As a follow up to our previous post on VMware and Hyper-V Working Together, VMware has released a version of VMware Workstation that works with the Windows Hypervisor Platform (WHP). This release adds support for VMware Workstation running side by ... continue reading

Open innovation, customer choice, and reliability with SQL Server on SUSE

With nearly two decades of delivering joint innovation to meet changing business demands, Microsoft and SUSE continue to focus on enabling digital transformation for our customers, building on open source solutions, and a seamless collaborative support model for SUSE workloads ... continue reading
Networking stack in traditional scenarios

Introducing Packet Monitor

Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the ... continue reading
Networking stack in traditional scenarios

Introducting Packet Monitor

Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the ... continue reading
Diagram showing how the Thunderspy attack works

Secured-core PCs help customers stay ahead of advanced data theft

Researchers at the Eindhoven University of Technology recently revealed information around “Thunderspy,” an attack that relies on leveraging direct memory access (DMA) functionality to compromise devices. An attacker with physical access to a system can use Thunderspy to read and ... continue reading
 Windows Virtual Desktop high level architecture

Use Azure Firewall for secure and cost-effective Windows Virtual Desktop protection

This post was co-authored by Pavithra Thiruvengadam, Program Manager, Windows Virtual Desktop Work from home policies require many IT organizations to address fundamental changes in capacity, network, security, and governance. Many employees aren't protected by the layered security policies associated ... continue reading
Mitigating vulnerabilities in endpoint network stacks

Mitigating vulnerabilities in endpoint network stacks

The skyrocketing demand for tools that enable real-time collaboration, remote desktops for accessing company information, and other services that enable remote work underlines the tremendous importance of building and shipping secure products and services. While this is magnified as organizations ... continue reading

Enabling customer choice, agility, and performance with SQL Server on Red Hat

Since the release of SQL Server 2017 on Red Hat Enterprise Linux, the industry-leading SQL Server database has been available on Red Hat Linux technologies. Microsoft and Red Hat continue to jointly engineer SQL-related offerings on Red Hat and provide ... continue reading