SCOM: MSSQLServer Event ID 28005
Hey everyone, Theron (aka T-) here, Senior Consultant with Microsoft Consulting Services (MCS) specializing in Active Directory, but also dabbles with all things Systems Center. Recently, while...
View ArticleBoldly Going Part 2: Shakedown Cruise
Building the Crew In an earlier blog I laid out some basics needed to build your own portable lab. I focused on the hardware needed and the considerations you need to keep in mind to ensure a...
View ArticleCommunicate with Confidence – Taking the fear out of public speaking – Part 2
In my previous post, I talked about interpersonal communication and the four levels of conversation. Level 1 started with small talk while at the other end, Level 4, one finds themselves in a...
View ArticleAppLocker – Part 2
Introduction:In the previous blog we looked at the two paths, “whitelisting” and “blacklisting”, you could follow implementing AppLocker. In this blog I will look at the AppLocker Rules, Rule...
View ArticleProtect Administrative Accounts with Authentication Policies and Silos
Introduction One of the recommendations to protect privileged accounts from credential theft is to prevent administrative accounts from exposing credentials to unsecure computers, on this post I will...
View ArticleManage Azure monitor with Azure Blueprint
Background Azure resources can be deploy and configure automatically by using ARM Templates, Azure Policy, PS scripts etc… those automation ways have it’s limit to sets of allows and deny functions,...
View ArticleSystem Center Configuration Manager – "Configure SQL Server Service Broker...
The Issue Recently I installed the Latest Tech Preview in my lab environment and while running an In-Console update I received an error “Configure SQL Server Service Broker – Failed”. The...
View ArticleGetting Started with Terraform on Azure DevOps
Introduction As with most things, there are a number of ways to utilize Azure DevOps to orchestrate your management of Azure Resources through terraform. This post will walk through a way that I have...
View ArticlePowerShell: Active Directory Cleanup – Part 1
Hello World, Scott Williamson Senior Premier Field Engineer here. As a PFE, I frequently work with customers who ask how to cleanup Active Directory of old objects and data. To assist them automate...
View ArticleMinecraft on Azure
Introduction Despite approaching it’s 10th anniversary, Minecraft remains an incredibly popular game with both children and adults. There are many options to play Minecraft — locally, on a Minecraft...
View ArticleField Notes: Azure AD Connect – Migrating from AD FS to Password Hash...
This is a continuation of a series on Azure AD Connect. I started off this Azure AD Connect series by going through the express installation path, where the password hash synchronization (PHS) sign-in...
View ArticlePowerShell: Active Directory Cleanup – Part 2 – Spacey Computer Names
Introduction Hello again, Scott Williamson back with the next installment in the series “PowerShell: Active Directory Cleanup”. For this installment we going to take a look at a script that finds...
View ArticleHow to enable Internet and vNET connectivity for nested VMs in Azure
For a full walk-through of this setup, please watch the video at the end of this post. Greetings readers, Hyper-V nested virtualization in Azure has unlocked different scenarios and use cases such as...
View ArticleConfiguration Manager – How Updates install during a Maintenance Window.
This is a question I have had since I started with SCCM 2007. I thought I had a grasp of it until I was talking with a customer and started second guessing myself. Why aren’t all my updates installing...
View ArticleSetup Hybrid Azure AD Join – Part 1
In addition to users, device identities can be managed by Azure Active Directory as well, event if they are already managed by your on-premise network. This two part series will walk you throught the...
View ArticleSetup Hybrid Azure AD Join – Part 2
Welcome back to the second and last post to setup hybrid Azure ad join. Hopefully all went well with configuring Pass-Through Authentication. Below you will find a link back to part 1. Configure...
View ArticleCleaning Up the Mess in Your Group Policy (GPO) Environment
Intro Group Policy is a great way to enforce policies and set preferences for any user or computer in your organization.However, anyone who managed Group Policy knows it might become very messy after...
View Article