Quantcast
Channel: Secure Infrastructure Blog
Browsing all 196 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Most Common Mistakes in Active Directory and Domain Services – Part 1

As a Premier Field Engineer (PFE) at Microsoft, I encounter new challenges on a daily basis. Every customer has its own uniqueness, and each environment is different from the other. And yet, there are...

View Article


Image may be NSFW.
Clik here to view.

Most Common Mistakes in Active Directory and Domain Services – Part 2

In this blog post, we will continue to explore some of the most common mistakes in Active Directory and Domain Services. Part 1 of the series covered the first three mistakes, and today we'll go over...

View Article


Image may be NSFW.
Clik here to view.

Understanding and using the Pending Restart Feature in SCCM Current Branch

I get queried a lot on new features in System Center Configuration Management and how they can be used to simplify life for customers, on a daily basis. Microsoft's mission is to empower every person...

View Article

Image may be NSFW.
Clik here to view.

Configuration Manager Advanced Dashboards – Rich view of your Configuration...

  Introduction   As a Premier Field Engineer (PFE) at Microsoft, I get asked by a lot of customers about custom dashboards and reports that are available or can be created for monitoring the SCCM...

View Article

Image may be NSFW.
Clik here to view.

Field Notes: The case of a crashing Hyper-V VM – Integration Services Out of...

Background I recently had an opportunity to offer assistance on a case relating to stop errors (blues screens) experienced in a Virtual Machine (VM) running on a Hyper-V Failover Cluster.  I was...

View Article


Image may be NSFW.
Clik here to view.

Understanding Volume Activation Services – Part 1 (KMS and MAK)

Windows Activation and KMS have been around for many years - and still - a lot of people don't understand the basics of Windows activation, what are the differences between KMS and MAK, and how to...

View Article

Image may be NSFW.
Clik here to view.

Office 365 ProPlus – End to End Servicing in Configuration Manager

The following post was contributed by Cliff Jones a Consultant working for Microsoft. Background Recently I was asked by a few of my customers on how to simplify the deployment of Office 365 ProPlus...

View Article

Image may be NSFW.
Clik here to view.

System Center Configuration Manager Client Health – Toolset to identify and...

Introduction I get asked by a lot of customers "How can we reduce the amount of time spent on manually troubleshooting agents, correctly identify what is wrong with the systems, quickly and...

View Article


Image may be NSFW.
Clik here to view.

Using ‘Scripts’ Feature in Configuration Manager for Ad Hoc WSUS Maintenance

Background   We all know how important WSUS maintenance is and there are numerous posts on how to automate and the scripts/queries to run. Have a read through This amazing Blog from Meghan Stewart |...

View Article


Image may be NSFW.
Clik here to view.

Understanding Volume Activation Services – Part 2 (Active Directory-Based...

In the previous part of the series, we talked about KMS, MAK, and how to choose between the two when looking for the right activation method in your environment. Today, we are going to talk about...

View Article

Image may be NSFW.
Clik here to view.

Field Notes: The case of the failed SQL Server Failover Cluster Instance –...

I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing.  They had internally transferred the case from the SQL team to folks...

View Article

Image may be NSFW.
Clik here to view.

Step by step MIM PAM setup and evaluation Guide – Part 3

This is third part of the series. In the previous posts we have prepared test environment for PAM deployment, created and configured all needed service accounts, installed SQL Server and prepared PIM...

View Article

Image may be NSFW.
Clik here to view.

Most Common Mistakes in Active Directory and Domain Services – Part 3

This blog post is the third (and last) part in the 'Most Common Mistakes in Active Directory In Domain Services" series. In the previous parts, we covered some major mistake like configuring multiple...

View Article


Image may be NSFW.
Clik here to view.

Time zone issues when copying SCOM alerts

Background When trying to copy-paste (ctrl+c, ctrl+v) alerts from the SCOM console to an Excel worksheet or just a text file, we noticed that the Created field values where different from the ones...

View Article

Image may be NSFW.
Clik here to view.

Field Notes: The case of buried Active Directory Account Management Security...

Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system.  As part of your overall security strategy, you should determine the level of auditing...

View Article


Image may be NSFW.
Clik here to view.

Field Notes: The case of the failed SQL Server Failover Cluster Instance –...

I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing.  They had internally transferred the case from the SQL team to folks...

View Article

Image may be NSFW.
Clik here to view.

Step by step MIM PAM setup and evaluation Guide – Part 3

This is third part of the series. In the previous posts we have prepared test environment for PAM deployment, created and configured all needed service accounts, installed SQL Server and prepared PIM...

View Article


Image may be NSFW.
Clik here to view.

Most Common Mistakes in Active Directory and Domain Services – Part 3

This blog post is the third (and last) part in the ‘Most Common Mistakes in Active Directory In Domain Services” series. In the previous parts, we covered some major mistake like configuring multiple...

View Article

Image may be NSFW.
Clik here to view.

Time zone issues when copying SCOM alerts

Background When trying to copy-paste (ctrl+c, ctrl+v) alerts from the SCOM console to an Excel worksheet or just a text file, we noticed that the Created field values where different from the ones...

View Article

Image may be NSFW.
Clik here to view.

Field Notes: The case of buried Active Directory Account Management Security...

Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system.  As part of your overall security strategy, you should determine the level of auditing...

View Article
Browsing all 196 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>