Threat Intelligence

Azure Site Recovery – case of the “network connection failure”

First published on TECHNET on Jul 06, 2014 Luís Caldeira is one of our early adopters who had pinged us with an interesting error. Thanks for reaching out to us Luís and sharing the details of your setup. I am sure this article will come handy to folks who hit this error at some point. […]

Azure Site Recovery – case of the “network connection failure” Continue Reading

Monitoring Hyper-V Replica using System Center Operations Manager

First published on TECHNET on Sep 13, 2013 Customers asked us if they can have a monitoring mechanism for Hyper-v Replica in a rainy day scenario. With System Center Operations Manager 2012 SP1, customers can now monitor Hyper-V Replica using a Management Pack available for free from the catalogue of SCOM. This blog post will

Monitoring Hyper-V Replica using System Center Operations Manager Continue Reading

Why you should not enable Credential Guard on Domain Controllers?

First published on TECHNET on Feb 21, 2017 Credential guard protects the credential derivatives like NTLM hash and Kerberos tickets; this TechNet article has a very detailed explanation as well as deployment guidelines. There was a recent change in this article to call out the following: Warning Enabling Credential Guard on domain controllers is not

Why you should not enable Credential Guard on Domain Controllers? Continue Reading

Use Windows Server 2016 to secure a jump server

First published on TECHNET on Feb 02, 2017 When talking to customers about the security features in Windows Server 2016, a common question keeps coming up, how do I secure my jump server? Recently, I worked with a Microsoft internal team to deploy Windows Server 2016 on their jump server; I thought it is a

Use Windows Server 2016 to secure a jump server Continue Reading

Windows Server 2016 security auditing for enhanced threat detection

First published on TECHNET on Jan 30, 2017 Windows Server 2016 includes new audit events to help with early detection of malicious activity in your datacenter. You can find the complete list of the events from this reference paper , and new events in Windows Server 2016 here under the Security auditing section. In this

Windows Server 2016 security auditing for enhanced threat detection Continue Reading

Overview of Device Guard in Windows Server 2016

First published on TECHNET on Sep 20, 2016 With thousands of new malware released every day, it may not be sufficient to only use signature-based detection to fight against malware. Device Guard on Windows Server 2016 changes from a mode where apps are trusted unless blocked by an antivirus or other security solution, to a

Overview of Device Guard in Windows Server 2016 Continue Reading

Reduce the number of admins on your servers with Just Enough Administration

First published on TECHNET on Aug 29, 2016 Least Privilege As part of your information security strategy, you are probably familiar with the principle of least privilege . The concept itself is simple — give your IT staff and end-users as few permissions as necessary to get their jobs done. This helps shrink your attack surface and limit

Reduce the number of admins on your servers with Just Enough Administration Continue Reading

Failover Clustering and IPv6 in Windows Server 2012 R2

First published on MSDN on Mar 24, 2014 In this blog, I will discuss some common questions pertaining to IPv6 and Windows Server 2012 R2 Failover Clusters. What network protocol does Failover Clustering default to? If both IPv4 and IPv6 are enabled (which is the default configuration), IPv6 will be always used by clustering. The

Failover Clustering and IPv6 in Windows Server 2012 R2 Continue Reading

How to Setup a Failover Cluster in a RODC Environment

First published on MSDN on Dec 13, 2012 In Windows Server 2012, a Failover Cluster can be created in an environment that has access only to a Read Only Domain Controller (RODC) but not a Read Write Domain Controller (RWDC). This deployment model can be useful in a branch office with unreliable network connectivity or

How to Setup a Failover Cluster in a RODC Environment Continue Reading

How to Troubleshoot Create Cluster Failures

First published on MSDN on May 07, 2012 In this blog, I will outline the steps in order to troubleshoot “Create Cluster” failures with Windows Server 2012 or later Failover Clustering. Step 1: Run the Cluster Validation Tool The cluster validation tool runs a suite of tests to verify that your hardware and settings are

How to Troubleshoot Create Cluster Failures Continue Reading