Deep dive on backup protection for IaaS VMs
As we continue with our discussion of backup, the next topic is backup specifically for IaaS virtual machines (VMs). An increasing number of organizations are moving their applications to the cloud...
View ArticleVideo Recap: Big Announcements at Citrix Synergy 2016
Late last night I got back from a pretty incredible 2.5 days at Citrix Synergy. Here’s a recap of the big (huge!) announcements, the keynotes, and everything in between.To read more about these huge...
View ArticleThe Endpoint Zone, episode 14: May 2016 was HUGE!!!
This is as close as it gets to being DON’T-MISS-EPISODE of The Endpoint Zone!In this episode I talk in depth about the huge announcements unveiled earlier this week at Citrix Synergy 2016 (watch my...
View ArticleRemote Desktop for Windows 10 exiting preview
I’d like to start by saying a big thank you to everyone who has installed and used our Microsoft Remote Desktop Preview client for Windows 10 and has provided us great feedback so far.After a few...
View ArticleLimited Periodic Scanning in Windows 10 to Provide Additional Malware Protection
Every month, Microsoft’s Malicious Software Removal Tool (MSRT) scans more than 500 million Windows devices for malware and malicious software. This tool aids in the detection and removal of malware...
View ArticleLink (.lnk) to Ransom
We are alerting Windows users of a new type of ransomware that exhibits worm-like behavior. This ransom leverages removable and network drives to propagate itself and affect more users. We detect this...
View ArticleNetFT Virtual Adapter Performance Filter
In this blog I will discuss what the NetFT Virtual Adapter Performance Filter is and the scenarios when you should or should not enable it.The Microsoft Failover Cluster Virtual Adapter (NetFT) is a...
View ArticleCapturing a Hyper-V VM Screen to a file
Here is an interesting thing you can do with Hyper-V – with a little bit of code you can grab a copy of the virtual machine display and write it out to a bitmap file:This is something that I use in a...
View ArticleDuqu 2.0 kernel exploitation technique analysis (part 1 of 2)
Out of the multiple components used in the sophisticated Duqu 2.0 cyberespionage attack, we had a chance to look into one of the kernel exploits used for its elevation-of-privilege attack.Early this...
View ArticleDuqu 2.0 kernel exploitation technique analysis (part 1 of 2)
Out of the multiple components used in the sophisticated Duqu 2.0 cyberespionage attack, we had a chance to look into one of the kernel exploits used for its elevation-of-privilege attack.Early this...
View ArticleDuqu 2.0 kernel exploitation technique analysis (part 1 of 2)
Out of the multiple components used in the sophisticated Duqu 2.0 cyberespionage attack, we had a chance to look into one of the kernel exploits used for its elevation-of-privilege attack.Early this...
View ArticleAdding yourself to the Hyper-V Administrators group with PowerShell
I am currently setting up a couple of new computers – and thought I would share this little tidbit of information. As I have blogged in the past, you do not need to run “As Administrator” to use...
View ArticleDNS and IIS MPs Updated for Nano Server Support
Hello Folks,We would like to let you know that we updated DNS and IIS preview management packs to support monitoring of those server roles running on Nano Server Technical Preview 4. We will soon be...
View ArticleImportant changes to Microsoft Active Protection Service (MAPS) endpoint
BackgroundWindows Defender, System Center Endpoint Protection and our other realtime protection products can offer better user protection by enabling the Microsoft Active Protection Service (MAPS)...
View Article4 for 4: MSFT is the Only “Leader” in all Four Gartner MQ’s
Every year, during the Spring and Summer, there is a flurry of analysis released from the Gartner and some of the most anticipated insights come via what Gartner calls the Magic Quadrant(MQ).The MQ is...
View ArticleGetting Intelligent with Microsoft Cognitive Services
Last week Steve Guggenheimer posted something really interesting on his blog about the work Microsoft has been doing to make AI features like vision, speech, and natural language commands accessible to...
View ArticleNew in Intune: Partnership with SAP and Citrix, MAM improvements, and more
We have been busy working on new improvements for you, and we are happy to announce that they are now being rolled out globally. You should start seeing these changes in Intune standalone shortly. Some...
View ArticleWhat’s new in failover clustering: #01 Cluster OS Rolling Upgrade
This post was authored by Rob Hindman, Senior Program Manager, Windows Server.Better agility for your private cloudWe asked what you needed in the next release of Windows Server and we heard you...
View ArticlePowerShell FAQ: Top 5 Questions about PowerShell from the Field
Hi folks, my name is Thiago Cardoso and I deliver workshops and custom support for our customers related to PowerShell, and I wanted to talk to you today about the top 5 questions I receive in the...
View ArticleLock the VM Console when you close Hyper-V UI
There is a little feature that we snuck into Hyper-V recently that is very handy for our security minded users out there. Normally, if you connect to a virtual machine with Remote Desktop or Enhanced...
View Article