Select Page
How to Build Windows Storage Spaces Direct on a Virtual Lab

How to Build Windows Storage Spaces Direct on a Virtual Lab

Step by step instructions to build a Windows Storage Spaces Direct virtual lab on PC. PowerShell script to automate the process.continue reading

Copying Files into a Hyper-V VM with Vagrant

A couple of weeks ago, I published a blog with tips and tricks for getting started with Vagrant on Hyper-V. My fifth tip was to “Enable Nifty Hyper-V Features,” where I briefly mentioned stuff like differencing disks and virtualization extensions ... continue reading
You can also do this with PowerShell

Learning to Use Vagrant: Tips and Tricks with Vagrant and Hyper-V

A few months ago, I went to DockerCon as a Microsoft representative. While I was there, I had the chance to ask developers about their favorite tools. The most common tool mentioned (outside of Docker itself) was Vagrant. This was ... continue reading
Figure 1. Infection cycle overview

Exploring the crypt: Analysis of the WannaCrypt ransomware SMB exploit propagation

On May 12, there was a major outbreak of WannaCrypt ransomware. WannaCrypt directly borrowed exploit code from the ETERNALBLUE exploit and the DoublePulsar backdoor module leaked in April by a group calling itself Shadow Brokers. Using ETERNALBLUE, WannaCrypt propagated as ... continue reading
Windows 10 platform resilience against the Petya ransomware attack

Windows 10 platform resilience against the Petya ransomware attack

The Petya ransomware attack on June 27, 2017 (which we analyzed in-depth in this blog) may have been perceived as an outbreak worse than last month's WannaCrypt (also known as WannaCry) attack. After all, it uses the same SMB exploit ... continue reading
New ransomware, old techniques: Petya adds worm capabilities

New ransomware, old techniques: Petya adds worm capabilities

(Note: We have published a follow-up blog entry on this ransomware attack. We have new findings from our continued investigation, as well as platform mitigation and protection information: Windows 10 platform resilience against the Petya ransomware attack.) On June 27, ... continue reading
Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security

Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security

On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by releasing a set of weaponized exploits. Shortly thereafter, one of these exploits was used to create wormable malware that we now know ... continue reading
Migrating Datacenter to Azure - Part 1

Migrating Datacenter to Azure – Part 1

Background Quite a while back a Managed Service Provider partner (hereafter referred to as "the MSP") approached Microsoft regarding migrating one of their datacenter facilities to Azure. The MSP is an experienced managed service provider providing Dynamics ERP, ISV solutions ... continue reading
Migrating Datacenter to Azure – Part 1

Migrating Datacenter to Azure – Part 1

Background Quite  a while back a Managed Service Provider partner (hereafter referred to as “the MSP”) approached Microsoft regarding migrating one of their datacenter facilities to Azure. The MSP is an experienced managed service provider providing Dynamics ERP, ISV solutions ... continue reading
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading