System Center Aralık 2018 Bülten

 

SYSTEM CENTER OPERATIONS MANAGER

Using PowerShell to add update and delete Class instances in SCOM

Sync SCVMM Hosts to SCOM Groups

Version agnostic Management Packs

How to discover and monitor a clustered application

System Center 2019 – What’s New

Updated – Using MP Viewer to unseal or export MP to XLS or HTML

Updated – SCOM Maintenance Mode PowerShell

XML for Product or Company Knowledge

The case of undiscovered SQL server roles in SCOM

A case of ghost objects in SCOM

System Center Management Pack for Windows Server Cluster

SCOM Management Pack Creator V2.0

 

Back to top

 
 

AZURE MONITOR

Azure Monitor for containers now generally available

Understanding health criteria in Azure Monitor for VMs

Azure Monitor: Detecting and Alerting on File Changes

Add Custom Performance Counters Log Analytics

Automatic Remediation Tasks in the Hybrid Environment

Pluralsight Course: Microsoft Azure Developer: Monitoring Performance

Create custom KPI dashboards using Azure Application Insights

Must Install Azure Monitor Solutions

Parse text data in Azure Log Analytics

Ingestion Time in Log Analytics

Kusto Query Language with Azure Notebooks and Azure Data Explorer

Azure Monitor: introduction to monitor service for virtual machines

How to view container logs real time with Azure Monitor for containers

Create functions in Application Insights through REST API

Best practices for queries used in log alerts rules

Finding Diagnostic Logs for Azure Services

Automatic Performance monitoring in Azure SQL Data Warehouse preview

Monitor your BBQ with Powershell and Azure Log Analytics

 

Back to top

 

SYSTEM CENTER CONFIGURATION MANAGER

System Center Configuration Manager Feedback

Update 1810 for Configuration Manager current branch is now available

SQL Server Native Client Update Warning Prerequisite for ConfigMgr 1810

ConfigMgr Application Approval via Email

Using Fully Qualified Domain name for remote control

Application approval improvements in ConfigMgr 1810

Add PowerShell script content directly in the TS Editor using ConfigMgr Technical Preview 1811

Cabana Sessions with ConfigMgr Technical Preview 1812

Keeping the SCCM Cache Clean with DCM

Launch Application during Task Sequence

SCCM Logs and Quick Tips to Read Logs

Create SCCM Application Phased Deployments

The value of bandwidth and peer caching with ConfigMgr

Approve SCCM Application Requests via Email – SCCM 1810 Feature

Configure Email Notification in SCCM Configuration Manager

SCCM 1810 Prerequisite Check Failed – Fix for Error and Warnings

SCCM 1810 Upgrade Video Guide – Best Practices

SCCM Integration with Azure Log Analytics with OMS Connector

 

Back to top

 

INTUNE / ENTERPRISE MOBILITY

How Microsoft uses Conditional Access – The Endpoint Zone with Brad Anderson

Rule your inbox with Microsoft Cloud App Security

How does Microsoft Intune transform Android enterprise management? Let me count the ways

Microsoft is a Leader in The Forrester Wave™: Unified Endpoint Management, Q4 2018

Intune Device Management – Removing Local Admins in Windows 10 Devices

Reduce your potential attack surface using Azure ATP Lateral Movement Paths

 

Back to top

 

VIRTUALIZATION

Azure Stack customer journey

Virtual Network Service Endpoints for serverless messaging and big data

Improving Azure Virtual Machine resiliency with predictive ML and live migration

An easy way to bring back your Azure VM with In-Place restore

 

Back to top

 

DATA PROTECTION

Microsoft Azure Backup Server(MABS) V3 is now available

Azure Backup can automatically protect SQL databases in Azure VM through auto-protect

Azure Backup Server now supports SQL 2017 with new enhancements

Apply the latest Azure Site Recovery capabilities with automatic agent update

Disaster recovery of zone pinned Azure Virtual Machines to another region

 

Back to top

 

SECURITY

Security best practices for Azure solutions

Protect your network resources in Azure Security Center

Evolution of Microsoft Threat Protection – December update

How to help maintain security compliance

Top 10 actions to secure your environment

Phishing with the sharks using Attack Simulator

Secure Privileged Access with phased roadmap

Windows Defender ATP device risk score exposes new cyberattack, driving conditional access

Windows Defender ATP has protections for USB and removable devices

Advanced Persistent Threat – What is It, How to Detect It

 

Back to top

Bu yazının kalıcı bağlantısı http://www.sertactopal.com/system-center-aralik-2018-bulten

Bir cevap yazın

Your email address will not be published.