Infrastructure + Security: Noteworthy News (December, 2017-Part 1)

Hello there! Stanislav Belov here to bring you the next issue of the Infrastructure + Security: Noteworthy News series!   As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis. Enjoy!  Microsoft Azure Transforming your VMware environment… Read more

Simple PowerShell Network Capture Tool

Hello all. Jacob Lavender here again for the Ask PFE Platforms team to share with you a little sample tool that I’ve put together to help with performing network captures. This all started when I was attempting to develop an effective method to perform network traces within an air gapped network. My solution had to… Read more

Using WMI to Verify Group Policy

Scenario: My name is Benjamin Morgan and I’m a Platforms PFE. Recently I was working with a customer on a Windows 10 upgrade project and they posed an interesting requirement. They needed to be able to verify that their required group policies were being applied and they needed to be able to run a report… Read more

Mix and Match WorkFolders, Azure AD, and AAD Application Proxy

Hi, Michele Ferrari here from the Premier Field Engineer-Identity Team in San Francisco here today to do some mix and match about multiple technologies we have within the Azure space. This is the question we’re going to answer today: How can We use an Azure AD cloud Only Identity to access an OnPrem non-cloud resource?… Read more

Demystifying Schannel

Hello all! Nathan Penn here to help with some of those pesky security questions that have lingered for years. Recently I have been fielding several questions on “How do I make sure that I am only using the TLS 1.2 protocol?”, “Can you disable 3DES and the legacy ciphers?”, and the “I just got back… Read more

Using Group Policy Preferences to Manage the Local Administrator Group

Hello Everyone! Graeme Bray back with you today to talk about how you can reduce the audit and risk surface within your environment. If you can’t tell, Microsoft has taken a strong stance towards security. In a previous life, I was responsible for providing results for audit requests from multiple sources. One risk (and management… Read more

Infrastructure + Security: Noteworthy News (October, 2017)

Hi there! Stanislav Belov here to bring you the next issue of the Infrastructure + Security: Noteworthy News series!   As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis. Enjoy!  Microsoft Azure Azure mobile app The… Read more

Protecting Domain Administrative Credentials

Hello, Paul Bergson back again with today’s topic of preventing your Domain Administrators and other privileged identities from logging into Tier 1 and Tier 2 devices. Credential theft protection is always an important step in protecting the enterprise. While your administrators are your most trusted employees within the IT enterprise, they may not always use… Read more

Configuring a Hyper-V Host with PowerShell DSC (Part 1)

Hello, my name is Michael Godfrey and I am a Platform’s Premier Field Engineer (PFE) at Microsoft. I have been a Fabric Administrator for the past few years and have made it a habit of building quite a few Hyper-V Hosts. I was always looking for a way to ensure my team and I knew… Read more

Windows PowerShell and DSC on Linux in Microsoft Azure

Hello everyone! I’m Preston K. Parsard, Platforms PFE and I’d like to talk about running PowerShell and Desired State Configuration (DSC) on Linux in Microsoft Azure. Just in case you haven’t heard yet, PowerShell has been open sourced and released for Linux since 18 August, 2016. More details and other resources for the announcement can… Read more