Assigning Office 365 Licenses Automatically
Hello World, Daniel Lucas and Eroilton Borges is here, with a special thanks to Rodrigo Fonseca to helping about Hybrid Identity and review and contribute for this one, to talk about how to...
View ArticleReplication Hurricanes: Why Restricted Groups are a No-Go for Domain Based...
Hi everyone! My name is Tim Medina, Premier Field Engineer, and today we are going to take a brief look at GPOs with a focus on restricted groups. More importantly, we will discuss how, if used in an...
View ArticleCluster Network Name Resources fail to come Online with Error 2114
Hello, my name is Chuck Timon and this is my first blog post as a Premier Field Engineer. Previous to my current position, I posted to the Core Team blog and the System Center: Virtual Machine Manager...
View ArticleInfrastructure + Security: Noteworthy News (August, 2017)
Hi there! Stanislav Belov here to introduce you to the new Infrastructure + Security: Noteworthy News series! Starting with this issue we are going to publish some interesting news, announcements,...
View ArticleAutomating the Collection of Configuration Manager Client Logs
Hello everyone! Seth Price here to talk with you today about automating the collection of Configuration Manager client logs. Configuration Manager client logs are useful in troubleshooting many types...
View ArticleMicrosoft BitLocker Administration and Monitoring (MBAM v2.5) Tips
The goal of this blog is to share some information learned (the hard way) from recent customer engagement. Hopefully these tips will save you time and accelerate future MBAM deployments. MBAM has...
View ArticleSecuring Privileged Access for the AD Admin – Part 1
Hello again, my name is still David Loder, and I’m still a PFE out of Detroit, Michigan. I have a new confession to make. I like cat videos. Your end users like cat videos. You may like cat videos...
View ArticleSecuring Privileged Access for the AD Admin – Part 2
Hello everyone, my name is still David Loder, and I’m still PFE out of Detroit, Michigan. Hopefully you’ve read Securing Privileged Access for the AD Admin – Part 1. If not, go ahead. We’ll wait for...
View ArticleProject Honolulu – A New Windows Server Management Experience for the...
Hello! My name is Kevin Kelling and I’m a Premier Field Engineer with Microsoft focused on Windows Server, virtualization, and Azure. Having worked with Windows Server since the NT 3.51 days, I’m...
View ArticleInfrastructure + Security: Noteworthy News (September, 2017)
Hi there! Stanislav Belov here to bring you the September edition of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include...
View ArticleReady for Windows
Hi, I’m Elizabeth Greene, an Enterprise Platforms PFE. I’m doing a lot of Windows 10 deployment work and get the question “Hey, does product XYZ work with Windows 10?” at least once a week. We have a...
View ArticleImplementing Multiple AGPM Servers
Hi Everyone, Paulo here, a Microsoft Premier Field Engineer (PFE), recently I have had several customers querying about how to deploy multiple AGPM Servers per Forest/Domain. As you know AGPM was...
View ArticleFailover Cluster File Share Storage Access Status is “Questionable”
Welcome everyone. This is Chuck Timon back this time to discuss a minor ‘annoyance’ in System Center Virtual Machine Manager 2012 R2. Those of you that have worked with System Center Virtual Machine...
View ArticleInfrastructure + Security: Noteworthy News (Ignite Edition)
Hi there! Stanislav Belov here to bring you an out-of-band Microsoft Ignite edition of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various...
View ArticleWindows PowerShell and DSC on Linux in Microsoft Azure
Hello everyone! I’m Preston K. Parsard, Platforms PFE and I’d like to talk about running PowerShell and Desired State Configuration (DSC) on Linux in Microsoft Azure. Just in case you haven’t heard...
View ArticleConfiguring a Hyper-V Host with PowerShell DSC (Part 1)
Hello, my name is Michael Godfrey and I am a Platform’s Premier Field Engineer (PFE) at Microsoft. I have been a Fabric Administrator for the past few years and have made it a habit of building quite a...
View ArticleProtecting Domain Administrative Credentials
Hello, Paul Bergson back again with today’s topic of preventing your Domain Administrators and other privileged identities from logging into Tier 1 and Tier 2 devices. Credential theft protection is...
View ArticleInfrastructure + Security: Noteworthy News (October, 2017)
Hi there! Stanislav Belov here to bring you the next issue of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include...
View ArticleUsing Group Policy Preferences to Manage the Local Administrator Group
Hello Everyone! Graeme Bray back with you today to talk about how you can reduce the audit and risk surface within your environment. If you can’t tell, Microsoft has taken a strong stance towards...
View ArticleDemystifying Schannel
Hello all! Nathan Penn here to help with some of those pesky security questions that have lingered for years. Recently I have been fielding several questions on “How do I make sure that I am only using...
View Article