Most Common Mistakes in Active Directory and Domain Services – Part 1
As a Premier Field Engineer (PFE) at Microsoft, I encounter new challenges on a daily basis. Every customer has its own uniqueness, and each environment is different from the other. And yet, there are...
View ArticleMost Common Mistakes in Active Directory and Domain Services – Part 2
In this blog post, we will continue to explore some of the most common mistakes in Active Directory and Domain Services. Part 1 of the series covered the first three mistakes, and today we'll go over...
View ArticleUnderstanding and using the Pending Restart Feature in SCCM Current Branch
I get queried a lot on new features in System Center Configuration Management and how they can be used to simplify life for customers, on a daily basis. Microsoft's mission is to empower every person...
View ArticleConfiguration Manager Advanced Dashboards – Rich view of your Configuration...
Introduction As a Premier Field Engineer (PFE) at Microsoft, I get asked by a lot of customers about custom dashboards and reports that are available or can be created for monitoring the SCCM...
View ArticleField Notes: The case of a crashing Hyper-V VM – Integration Services Out of...
Background I recently had an opportunity to offer assistance on a case relating to stop errors (blues screens) experienced in a Virtual Machine (VM) running on a Hyper-V Failover Cluster. I was...
View ArticleUnderstanding Volume Activation Services – Part 1 (KMS and MAK)
Windows Activation and KMS have been around for many years - and still - a lot of people don't understand the basics of Windows activation, what are the differences between KMS and MAK, and how to...
View ArticleOffice 365 ProPlus – End to End Servicing in Configuration Manager
The following post was contributed by Cliff Jones a Consultant working for Microsoft. Background Recently I was asked by a few of my customers on how to simplify the deployment of Office 365 ProPlus...
View ArticleSystem Center Configuration Manager Client Health – Toolset to identify and...
Introduction I get asked by a lot of customers "How can we reduce the amount of time spent on manually troubleshooting agents, correctly identify what is wrong with the systems, quickly and...
View ArticleUsing ‘Scripts’ Feature in Configuration Manager for Ad Hoc WSUS Maintenance
Background We all know how important WSUS maintenance is and there are numerous posts on how to automate and the scripts/queries to run. Have a read through This amazing Blog from Meghan Stewart |...
View ArticleUnderstanding Volume Activation Services – Part 2 (Active Directory-Based...
In the previous part of the series, we talked about KMS, MAK, and how to choose between the two when looking for the right activation method in your environment. Today, we are going to talk about...
View ArticleField Notes: The case of the failed SQL Server Failover Cluster Instance –...
I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing. They had internally transferred the case from the SQL team to folks...
View ArticleStep by step MIM PAM setup and evaluation Guide – Part 3
This is third part of the series. In the previous posts we have prepared test environment for PAM deployment, created and configured all needed service accounts, installed SQL Server and prepared PIM...
View ArticleMost Common Mistakes in Active Directory and Domain Services – Part 3
This blog post is the third (and last) part in the 'Most Common Mistakes in Active Directory In Domain Services" series. In the previous parts, we covered some major mistake like configuring multiple...
View ArticleTime zone issues when copying SCOM alerts
Background When trying to copy-paste (ctrl+c, ctrl+v) alerts from the SCOM console to an Excel worksheet or just a text file, we noticed that the Created field values where different from the ones...
View ArticleField Notes: The case of buried Active Directory Account Management Security...
Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system. As part of your overall security strategy, you should determine the level of auditing...
View ArticleField Notes: The case of the failed SQL Server Failover Cluster Instance –...
I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing. They had internally transferred the case from the SQL team to folks...
View ArticleStep by step MIM PAM setup and evaluation Guide – Part 3
This is third part of the series. In the previous posts we have prepared test environment for PAM deployment, created and configured all needed service accounts, installed SQL Server and prepared PIM...
View ArticleMost Common Mistakes in Active Directory and Domain Services – Part 3
This blog post is the third (and last) part in the ‘Most Common Mistakes in Active Directory In Domain Services” series. In the previous parts, we covered some major mistake like configuring multiple...
View ArticleTime zone issues when copying SCOM alerts
Background When trying to copy-paste (ctrl+c, ctrl+v) alerts from the SCOM console to an Excel worksheet or just a text file, we noticed that the Created field values where different from the ones...
View ArticleField Notes: The case of buried Active Directory Account Management Security...
Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system. As part of your overall security strategy, you should determine the level of auditing...
View Article