Select Page

Introduction to Building a Replica Domain Controller ARM Template

The idea behind this blog series came after something I noticed Microsoft does not have from an artifact perspective. Microsoft talks a lot about infrastructure as code by using ARM Templates. ARM Templates make cloud deployments declarative, idempotent, and add ... continue reading
Frequent questions about using Conditional Access to secure remote access

Frequent questions about using Conditional Access to secure remote access

Industry trends and changes in the way we work usually span years, with organizations evolving at their own pace. But we're living in unusual times. Organizations asking employees to work from home to slow the spread of COVID-19 are making ... continue reading
1_split-tunnel-001.PNG

Mastering Configuration Manager Bandwidth limitations for VPN connected Clients

Hi, Jonas, Roland and Stefan here! We are Microsoft Premier Field Engineers (PFEs) based in Germany focused on Microsoft Endpoint Manager related topics. Due to the current situation we get a lot of questions from our customers around Configuration Manger ... continue reading

Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do

True to form, human-operated ransomware campaigns are always on prowl for any path of least resistance to gain initial access to target organizations. During this time of crisis, as organizations have moved to a remote workforce, ransomware operators have found ... continue reading
blog2.png

Managing Patch Tuesday with Configuration Manager in a remote work world

The global health crisis has dramatically changed life for all of us. We are working to get you the information and guidance you need to keep your people productive and secure. Two weeks from today is Patch Tuesday, which will ... continue reading
Screenshot showing apps in the My Apps portal.

Making it easier for your remote workforce to securely access all the apps they need, from anywhere

Since I published my last blog, Five identity priorities for 2020, COVID-19 has upended the way we work and socialize. Now that physical distancing has become essential to protect everyone’s health, more people than ever are going online to connect ... continue reading

Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios

With the bulk of end users now working remotely, legacy network architectures that route all remote traffic through a central corporate network are suddenly under enormous strain. The result can be poorer performance, productivity, and user experience. Many organizations are ... continue reading

Azure SQL Database managed instance vs. SQL Server

As organizations face increasing pressure to modernize their applications and infrastructure, the benefits of the cloud have become impossible to ignore. Fortunately, Azure SQL Database managed instance makes it easy to move your SQL Server workloads to the cloud. Nearly ... continue reading
skissel_0-1584993340479.png

Azure DSC for Zero Trust Windows 10 Devices Managed by Intune

Introduction Zero Trust is defined by Microsoft as model that “assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to ... continue reading
Managing remote machines with cloud management gateway in Microsoft Endpoint Configuration Manager

Managing remote machines with cloud management gateway in Microsoft Endpoint Configuration Manager

In light of the global situation that has escalated over the past weeks regarding COVID-19 and the coronavirus; there has been a significant increase in the number people working from home. Indeed, myself and the rest of the Microsoft Endpoint ... continue reading