Introduction Despite approaching it's 10th anniversary, Minecraft remains an incredibly popular game with both children and adults. There are many options to play Minecraft -- locally, on a Minecraft hosted realm, or on a public server. In some cases, you may want to retain more control and run Minecraft on your own server. This allows … Continue reading Minecraft on Azure
Introduction Hello World, Scott Williamson Senior Premier Field Engineer here. As a PFE, I frequently work with customers who ask how to cleanup Active Directory of old objects and data. To assist them in automating cleanup I have written several PowerShell scripts, functions, and workflows that I want to share in this blog series. Duplicate … Continue reading PowerShell: Active Directory Cleanup – Part 1 – Duplicate Computers
Introduction As with most things, there are a number of ways to utilize Azure DevOps to orchestrate your management of Azure Resources through terraform. This post will walk through a way that I have found to be successful and relatively easy to maintain. It will not however describe the many benefits of using an Infrastructure … Continue reading Getting Started with Terraform on Azure DevOps
The Issue Recently I installed the Latest Tech Preview in my lab environment and while running an In-Console update I received an error "Configure SQL Server Service Broker - Failed". The Investigation If you watch a video Steve Rachui posted some time ago, there are some valuable tips for which logs to review and the … Continue reading System Center Configuration Manager – "Configure SQL Server Service Broker Failed"
Background Azure resources can be deploy and configure automatically by using ARM Templates, Azure Policy, PS scripts etc... those automation ways have it's limit to sets of allows and deny functions, And in particular, it can be configure only on the subscription level, with Azure Blueprint [Preview] you can manage policies and target it on … Continue reading Manage Azure monitor with Azure Blueprint
Introduction One of the recommendations to protect privileged accounts from credential theft is to prevent administrative accounts from exposing credentials to unsecure computers, on this post I will show you how to protect administrative accounts using Authentication Policies and Silos. Definition A quick definition from Microsoft web site.Authentication policy silos and the accompanying policies provide … Continue reading Protect Administrative Accounts with Authentication Policies and Silos
Introduction:In the previous blog we looked at the two paths, "whitelisting" and "blacklisting", you could follow implementing AppLocker. In this blog I will look at the AppLocker Rules, Rule Conditions and how to enforce them.NB. The Application Identity service is required to run for AppLocker to function. This can be configured in a GPO to … Continue reading AppLocker – Part 2
In this second post, we learn tips and tricks to maintain composure while having conversations. We also learn a few ways we can make those difficult conversations a bit easier on both ourselves and our listener.
Boldly Going - The Shakedown Cruise In an earlier blog I laid out some basics needed to build your own portable lab. I focused on the hardware needed and the considerations you need to keep in mind to ensure a successful effort. The hardware, however, is merely a tool (albeit a useful one) and needs … Continue reading Hyper-V On-The-Go – Enabling the Lab Engine
Hey everyone, Theron (aka T-) here, Senior Consultant with Microsoft Consulting Services (MCS) specializing in Active Directory, but also dabbles with all things Systems Center. Recently, while implementing SCOM 2019 in a customer's environment, I ran into an issue when trying to install agents; the discovery wizard would never complete the 'discovery' process. After making … Continue reading SCOM: MSSQLServer Event ID 28005