Just sharing a quick fix for an issue you may encounter when working in secure environments. The issue I encountered a Hyper-V VM in the lab today that would not boot from an Ubuntu ISO image. No matter what I…
Just sharing a quick fix for an issue you may encounter when working in secure environments. The issue I encountered a Hyper-V VM in the lab today that would not boot from an Ubuntu ISO image. No matter what I…
The Guarded Host feature (pictured below) allows us to run shielded VMs on Hyper-V with remote attestation. While uncommon on Windows 10, it can come up both in lab testing and developer scenarios in ultra-secure environments. In this case, a…
Earlier this year, Microsoft released a preview of the Azure Network Watcher. It includes a number of network analysis and troubleshooting features, but the packet capture is the one I get the most questions about. The packet capture is fed…
This question came up twice for me this week, and the answer is not obvious if you’ve not gone looking for this info before. You can actually track your Windows device registrations in two places: One option is through searching…
There have been many inquiries into if the band would be getting back together for a second version of the very popular “Inside the Microsoft Operations Management Suite“. Version 2 is 16 chapters of the latest and greatest of Microsoft…
Modern authentication is disabled in Exchange Online in Office 365 by default. However, you are quite likely to want modern authentication, because modern authentication in Office 365 enables authentication features like multi-factor authentication (MFA) using smart cards, certificate-based authentication, and…
Modern authentication is disabled in Skype for Business Online in Office 365 by default. However, you can enable it via PowerShell. The article explaining how to enable modern authentication in Skype for Business in Office 365 is missing a small…
Data security in the cloud is of chief concern not only to healthcare and financial services, but anyone with sensitive data of any kind that should only be disclosed to authorized parties. No discussion of enterprise security would be complete…
I find that using PowerShell remoting in my Azure automation runbooks is sometimes more convenient, as it eliminates the need to install and update additional PowerShell modules on my OMS hybrid runbook worker. For future reference, I wanted to capture an…
I found myself tonight needing to build a function to search the contents of text files in a very large zip archive to find one containing a specific value. To handle the operation quickly, I wanted to perform the operation…
Recent Comments