Tell Azure fabric VM Agent installed in ARM VM
Tell the Azure fabric when the VM Agent has been manually installed in a VM. read moreThe post Tell Azure fabric VM Agent installed in ARM VM appeared first on Windows Wide Open.
View ArticleCreate custom structure in PowerShell
Create custom structures in PowerShell. read moreThe post Create custom structure in PowerShell appeared first on Windows Wide Open.
View ArticleWill new branches be installed automatically on Nano Server?
Find out how new branches are deployed to Nano Server. read moreThe post Will new branches be installed automatically on Nano Server? appeared first on Windows Wide Open.
View ArticleDeprovision VMs that are stopped in Azure after 20 minutes.
A simple script to deallocate VMs that have been stopped for 20 minutes. read moreThe post Deprovision VMs that are stopped in Azure after 20 minutes. appeared first on Windows Wide Open.
View ArticleGA for Azure AD authentication in SQL Database and SQL Data Warehouse
Starting immediately, Azure Active Directory (Azure AD) authentication is generally available in Azure SQL Database and Azure SQL Data Warehouse. Azure AD provides an alternative to SQL Authentication...
View ArticleWindows Store Weekly: Summer Games Edition
To celebrate the kick off of the summer games today, the Windows Store team has curated a collection filled with great content. Today, we’re sharing some of the fun titles in the collection! Apps The...
View ArticleUse PowerShell to maintain IIS logs
Summary: Learn how to use PowerShell to maintain and work with IIS logs. Welcome back guest blogger, Terri Donahue. Here are Terri’s previous blog posts. Terri is a Senior Customer Support Engineer for...
View ArticleWhy CIOs Don’t Pick Up the Phone
Prospecting, selling, and success in the IT-Business arena A recent conversation in a blog illuminated a lot of erroneous thinking on several people’s part (if I may dare to say so) regarding...
View ArticleOffice 365 Service Assurance—gaining your trust with transparency
As customers consider the transition to the cloud, we often hear that they want to ensure security, privacy and compliance requirements are met. At Microsoft, we believe that customers have the right...
View ArticleMS16-087 – Critical: Security Update for Windows Print Spooler Components...
Severity Rating: CriticalRevision Note: V1.0 (July 12, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities...
View ArticleResource: Using Windows Defender Advanced Threat Protection After a Breach
Windows Defender Advanced Threat Protection will provide Enterprise users with the tools to investigate and deal with attacks on their networks. read moreThe post Resource: Using Windows Defender...
View ArticleHow businesses need to adapt to actually put their Big Data to work
Attivio CEO Stephen Baker shares how to go from data hoarding to data decisions Businesses are finding that Big Data can be easy to come by, but getting value out of it can be another problem...
View ArticleDefrag Tools #165 – Performance tracing in OOBE | Defrag Tools
In this episode of Defrag Tools, Sylvain Goyette joins Chad Beeder to talk about how to collect performance traces during Windows OOBE (Out of Box Experience). (Sorry that Sylvain’s screen is somewhat...
View ArticleGoogle Research Finds Free Software Bundles Come with Security Cost
Nicole Henderson Adware attacks are often more than users bargain for New research from Google traces over 800 adware bundles that include variety of security risks. read moreThe post Google Research...
View ArticleWHDC White Papers
White papers for driver and hardware developers working with Windows. The post WHDC White Papers appeared first on Windows Wide Open.
View ArticleConnecting to work on your Windows 10 device with Microsoft Intune
If you work remotely or use your personal Windows 10 device to connect to work, enroll in mobile device management through Microsoft Intune for secure access to corporate resources. Your personal data...
View ArticleUsing Windows Defender telemetry to help mitigate malware attacks
Microsoft IT uses telemetry from Windows Defender and System Center 2012 Endpoint Protection to help us proactively spot trends in malware behavior and identify top types of malware and triggers for a...
View ArticleSecurity Update for Word Viewer (KB3115480)
A security vulnerability exists in Word Viewer that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. The post Security Update for...
View ArticleSecurity Update for Word Viewer (KB3115479)
A security vulnerability exists in Word Viewer that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability. The post Security Update for...
View ArticleUpdate for Microsoft Excel 2010 (KB3115476) 32-Bit Edition
Microsoft has released an update for Microsoft Excel 2010 32-Bit Edition. This update provides the latest fixes to Microsoft Excel 2010 32-Bit Edition. Additionally, this update contains stability and...
View Article