Network

Azure Recovery Services Vault Management – performing a vault swap

First published on TECHNET on Aug 08, 2017 In this blog post I will address some of the questions we’re receiving from customers regarding Azure Backup and Recovery Services vaults. We will focus on one of the most common Azure Backup / Recovery Services Vault management scenarios, which is a ‘vault swap’ for a Data […]

Azure Recovery Services Vault Management – performing a vault swap Continue Reading

How to Manually Create a SQL Replica in DPM 2012 R2

First published on TECHNET on Mar 21, 2017 There may be circumstances where creating SQL replica automatically over the network may not be possible due to network bandwidth constraint between DPM server and SQL server(situations where DPM and protected server are in different sites). In such situations we can rely on manual replica creation process.

How to Manually Create a SQL Replica in DPM 2012 R2 Continue Reading

How to perform a manual initial replica on DPM Modern Backup Storage

First published on TECHNET on Feb 07, 2017 DPM can backup a variety of workloads as SQL, SharePoint, Exchange, Hyper-V VMs, File Servers, among others. While doing so, DPM creates an initial replica of the data, and takes the following backups incrementally, optimizing Storage and Network resources. However, at times, due to the large size

How to perform a manual initial replica on DPM Modern Backup Storage Continue Reading

INTUNE – Intune and Autopilot Part 4 – Enroll your first device

First published on MSDN on Nov 27, 2018 In the last blog posts, INTUNE – Intune and Autopilot Part 1 – The Blueprint INTUNE – Intune and Autopilot Part 2 – Setting up your environment Intune and Autopilot Part 3 – Preparing your environment we guided you through all the necessary steps to get your

INTUNE – Intune and Autopilot Part 4 – Enroll your first device Continue Reading

App-V Auto Sequencing Part 2 – Preparing the Host and VM

App-V Auto Sequencing Part 1, the blueprint App-V Auto Sequencing Part 2 – Preparing the Host and VM App-V Auto Sequencing Part 3 – Auto Sequence Applications App-V Auto Sequencing Part 4 – Automate the sequencing process further So, you’re ready to start and excited to see the results. Just a few more steps before

App-V Auto Sequencing Part 2 – Preparing the Host and VM Continue Reading

How to query Azure resources using the Azure CLI

TL/DR: The Azure CLI can be used to query data from Azure. For more information on how to use the Azure CLI query functionality, see the Azure CLI Query documentation. The Azure CLI can be used to not only create, configure, and delete resources from Azure but to also query data from Azure. To do

How to query Azure resources using the Azure CLI Continue Reading

Creating IoT applications with Azure Database for PostgreSQL

There are numerous IoT use cases in different industries, with common categories like predictive maintenance, connected vehicles, anomaly detection, asset monitoring, and many others. For example, in water treatment facilities in the state of California, IoT devices can be installed in water pumps to measure horse power, flow rate, and electric usage of the water

Creating IoT applications with Azure Database for PostgreSQL Continue Reading

Tough Questions Answered: How to Move a Physical SQL Always-On Cluster to Different Hardware

Recently I was involved in a troubleshooting on a SQL Always-On failover cluster on a Windows Server 2012R2, and let me say… ”A SPECIAL ALWAYS ON CLUSTER!” PROBLEM DESCRIPTION The customer has a branch office in a remote site, with a physical SQL Always On Cluster.He wants to move this physical cluster from the remote

Tough Questions Answered: How to Move a Physical SQL Always-On Cluster to Different Hardware Continue Reading

Recommendations for deploying the latest Attack surface reduction rules for maximum impact

The keystone to good security hygiene is limiting your attack surface. Attack surface reduction is a technique to remove or constrain exploitable behaviors in your systems. In this blog, we discuss the two attack surface reduction rules introduced in the most recent release of Windows and cover suggested deployment methods and best practices. Software applications

Recommendations for deploying the latest Attack surface reduction rules for maximum impact Continue Reading

S2D Networking Best Practices @ MVP Days

Hi Folks, Dan here with a quick post to let you know about a recent presentation given at Storage Spaces Direct MVP Days.  During this session, I discussed some of the requirements and best practices for RDMA, and also covered (very quickly) some of the synthetic best practices. As a quick refresher: RDMA: Network traffic is

S2D Networking Best Practices @ MVP Days Continue Reading