Infrastructure + Security: Noteworthy News (Ignite Edition)

Hi there! Stanislav Belov here to bring you an out-of-band Microsoft Ignite edition of the Infrastructure + Security: Noteworthy News series!   As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis. Enjoy! Microsoft Azure Inside Microsoft Azure… Read more

Failover Cluster File Share Storage Access Status is “Questionable”

Welcome everyone. This is Chuck Timon back this time to discuss a minor ‘annoyance’ in System Center Virtual Machine Manager 2012 R2. Those of you that have worked with System Center Virtual Machine Manager 2012 R2 for a while and have configured Failover Clusters to be managed by Virtual Machine manager, may have seen this… Read more

Implementing Multiple AGPM Servers

Hi Everyone, Paulo here, a Microsoft Premier Field Engineer (PFE), recently I have had several customers querying about how to deploy multiple AGPM Servers per Forest/Domain. As you know AGPM was designed to centralize change control over Group Policies so not exactly developed for this intended purpose. The configuration of Group Policy in a single… Read more

Infrastructure + Security: Noteworthy News (September, 2017)

Hi there! Stanislav Belov here to bring you the September edition of the Infrastructure + Security: Noteworthy News series! As a reminder, the Noteworthy News series covers various areas, to include interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis. Enjoy! Microsoft Azure Backup and disaster recovery… Read more

Securing Privileged Access for the AD Admin – Part 2

Hello everyone, my name is still David Loder, and I’m still PFE out of Detroit, Michigan. Hopefully you’ve read Securing Privileged Access for the AD Admin – Part 1. If not, go ahead. We’ll wait for you. Now that you’ve started implementing the roadmap, and you’re reading this with your normal user account (which no… Read more

Microsoft BitLocker Administration and Monitoring (MBAM v2.5) Tips

The goal of this blog is to share some information learned (the hard way) from recent customer engagement. Hopefully these tips will save you time and accelerate future MBAM deployments. MBAM has dependencies on SQL Server, IIS web services and Active Directory. As a result, it’s important to set expectations up front regarding collaboration needs… Read more

Automating the Collection of Configuration Manager Client Logs

Hello everyone! Seth Price here to talk with you today about automating the collection of Configuration Manager client logs. Configuration Manager client logs are useful in troubleshooting many types of client issues including client installation, client health, software update installation, hardware inventory, and client policy. In many cases the administrator assisting with troubleshooting client issues… Read more

Infrastructure + Security: Noteworthy News (August, 2017)

Hi there! Stanislav Belov here to introduce you to the new Infrastructure + Security: Noteworthy News series! Starting with this issue we are going to publish some interesting news, announcements, links, tips and tricks from Windows, Azure, and Security worlds on a monthly basis. Enjoy! Microsoft Azure How Azure Security Center helps protect your servers… Read more

Cluster Network Name Resources fail to come Online with Error 2114

Hello, my name is Chuck Timon and this is my first blog post as a Premier Field Engineer. Previous to my current position, I posted to the Core Team blog and the System Center: Virtual Machine Manager Engineering Blog. In this post, I examine a customer issue where two cluster network name resources in a… Read more

Replication Hurricanes: Why Restricted Groups are a No-Go for Domain Based Groups

Hi everyone! My name is Tim Medina, Premier Field Engineer, and today we are going to take a brief look at GPOs with a focus on restricted groups. More importantly, we will discuss how, if used in an unsupported manner, you can cause your very own replication hurricane. But, before we get into that let’s… Read more