Averting ransomware epidemics in corporate networks with Windows Defender ATP

Microsoft security researchers continue to observe ransomware campaigns blanketing the market and indiscriminately hitting potential targets. Unsurprisingly, these campaigns also continue to use email and the web as primary delivery mechanisms. Also, it appears that most corporate victims are simply caught by the wide nets cast by ransomware operators. Unlike cyberespionage groups, ransomware operators do…


UR12 for SCOM 2012 R2 – Step by Step

  KB Article for OpsMgr:  https://support.microsoft.com/en-us/help/3209587/system-center-2012-r2-om-ur12 Download catalog site:  http://www.catalog.update.microsoft.com/Search.aspx?q=3209587 Additional MP Update download required:  https://www.microsoft.com/en-us/download/details.aspx?id=55033     NOTE:  I get this question every time we release an update rollup:   ALL SCOM Update Rollups are CUMULATIVE.  This means you do not need to apply them in order, you can always just apply the latest update. …

38

The resource object with key ‘DataRefresh_Warning_DataSources’ was not found

UPDATE: 3/24/17 – First Patch to resolve this issue has been released!!!! (See below) If you have not already installed the following patches on your PowerPivot for SharePoint Analysis Services instance and/or the MSI DO NOT PROCEED WITH THE INSTALLATION! SQL 2012 SP3 CU6 – Resolved (see below) SQL 2012 SP3 CU7 – Resolved (see below) SQL 2014…


#worklifeflow Podcast: Unsere People-Agenda – der Mitarbeiter im Mittelpunkt

Im September 2016 haben wir unser #OfficemitWindows bezogen, unsere neue Deutschland-Zentrale in München-Schwabing. Für uns ist nun ein guter Zeitpunkt, ein erstes Fazit zu ziehen. Und gleichzeitig möchten wir Euch einen Blick hinter die Kulissen anbieten. Deshalb haben wir gemeinsam mit New Work-Experte Bastian Wilkat eine Podcast-Serie ins Leben gerufen, in der meine Kollegen und…


December 2016 TechNet Guru Winners!

All the votes are in!    And below are the results for the TechNet Guru Awards, December 2016 !!!!   Firstly, deep apologies to a few of our mighty contenders for failing to include your submissions in last month’s competition. They have been added to January’s submissions. It seems some of the last minute entries may have missed the…


Home Lab Secrets: Building the Killer Home Lab Part 5 (Deploying Exchange Server 2016)(New Azure Portal)

In Part 4 of this series we deployed a Remote Desktop Gateway Server within our lab. In Part 5 we will be adding Email capabilities within our lab using Microsoft Exchange Server 2016. Our Exchange Deployment will consist of a 2 Exchange 2016 Servers.  To keep our Azure costs down we will Deploy a Small Sized (F1s) VM within…


Temp DB recommendations for SCOM 201x

When someone asks you about TempDB sizing, does your jaw hit the floor? Time to pull out my handy detective skills   Context & Best Practices  SQL Server uses the tempdb database to store temporary objects. This can include temporary tables, stored procedures, work tables, and row versions. In short, most changes to user databases…


Cybersecurity attackers toolkit – what you need to know

Cybersecurity attackers toolkit – what you need to know
Cybersecurity attackers toolkit – what you need to know

Cyber attackers have many tools available to them to infiltrate an enterprise network, find that sensitive piece of data they’re looking for, and exfiltrate it from your enterprise. In conversations with customers, I’ve found that some are familiar with these tools; however, many aren’t, or they are not fully aware of how powerful these tools…