Select Page
Security guidance for remote desktop adoption

Security guidance for remote desktop adoption

As the volume of remote workers quickly increased over the past two to three months, the IT teams in many companies scrambled to figure out how their infrastructures and technologies would be able to handle the increase in remote connections ... continue reading

Secure remote access to on-premises apps

As COVID-19 continues to require social distancing to ensure everyone’s safety, we have seen many companies support their employee’s needs and promote safety by allowing them to work from home and use online tools to collaborate. This has led to ... continue reading
Zero Trust framework to enable remote work

Zero Trust framework to enable remote work

Zero Trust Assessment tool now live! With such a large influx of employees working remotely, many of the traditional network-based security controls are unable to protect the organization. For many organizations, there are two options: route all remote traffic through ... continue reading

IIS Best Practices

It has been almost eight years since I first wrote a blog on IIS best practices. During this time, several new versions of IIS have arrived, some reached end of lifecycle; we were introduced a new development platform called .NET ... continue reading
SRVAR_0-1584613468284.png

How to Guide for SC- Virtual Machine Manager 2019 UR1 features

The very first update roll up for System Center Virtual Machine Manager 2019 is now available. The update release contains several features requested by customers on VMM user voice and other forums. Thanks for engaging with us and helping us ... continue reading
Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Secured-core PCs: A brief showcase of chip-to-cloud security against kernel attacks

Gaining kernel privileges by taking advantage of legitimate but vulnerable kernel drivers has become an established tool of choice for advanced adversaries. Multiple malware attacks, including RobbinHood, Uroburos, Derusbi, GrayFish, and Sauron, and campaigns by the threat actor STRONTIUM, have ... continue reading
Screenshot (33)

Learn new strategies and technologies to optimize your hybrid cloud

IT environments are becoming more complex as organizations are combining on-premises, cloud, and edge infrastructures. There are some major benefits to having a flexible, hybrid IT environment, such as the ability to create new business value while also meeting local ... continue reading
The NVv4 VM sizes mapped to different VDI user profiles to guide customers to pick the right sized VM

Power your Azure GPU workstations with flexible GPU partitioning

Today we're sharing the general availability of NVv4 virtual machines in South Central US, East US, and West Europe regions, with additional regions planned in the coming months. With NVv4, Azure is the first public cloud to offer GPU partitioning ... continue reading
Learn about Azure Hybrid Cloud resources

Learn about Azure Hybrid Cloud resources

As you know, Hybrid Cloud is here to stay, we have a couple of blogs on Azure Hybrid cloud management. I recommend that you check out blogs on Azure Hybrid: In addition, also check out the Azure Hybrid event: On ... continue reading
L2bridge Container Networking

L2bridge Container Networking

Overview Containers attached to a l2bridge network will be directly connected to the physical network through an external Hyper-V switch. L2bridge networks can be configured with the same IP subnet as the container host, with IPs from the physical network ... continue reading