Microsoft Cloud ve Datacenter Management Ekim 2021 Bülten



Thomas Maurer provides an Azure Arc enabled data services video series

Kevin Holman provides a SCOM MP to automate Agent load balancing

April Edwards and John Downs help to level up your Bicep skills

Tyson Paul opens up the SQL Management Pack queries

Charbel Nemnom walks through enabling Vulnerability Assessment on SQL with Azure Policy

Jitesh Kumar walks through blocking USB device access using Intune

Rod Trent shows how to monitor for ProxyShell Microsoft Exchange vulnerabilities using Azure Sentinel


Billy York blogs about deploying Azure Monitor Agent at scale

Anders Bengtsson provides a Kusto query to compare the current counter value with previous one

Edoardo Zonca shows how to generate alerts using the log to metrics feature in Azure Monitor

Benoit Lecours shows how to monitor SCCM scripts from console and reports

Anoop C Nair shows how to create SCCM device collections for Windows Server 2022

Jason Sandys discusses remote Windows Autopilot and hybrid Azure Active Directory join

Alex Simons announces Improved Identity Protection signal quality and visibility



Announcing password removal for Microsoft accounts

We’re excited to announce that anyone using a consumer Microsoft account can go completely passwordless! You can now delete your password from your Microsoft account—or set up a new account with no password—and sign-in using other more secure and convenient authentication methods such as the Microsoft Authenticator app, Windows Hello, or physical security keys.

All it takes is three easy steps: Visit Advanced Security Options for your Microsoft account, select Passwordless Account, then follow the on-screen prompts. That’s it! Once you’ve removed your password, you can sign in to your account by approving a notification from the Microsoft Authenticator app.


Join us behind the scenes at Azure, thanks to the Well-Architected Framework

Here at Microsoft, we give a lot of advice. We’d really like to help you thrive on our platform. Reliability, security, cost optimization, operational excellence, and performance efficiency—we know that they are not easy to tackle when it comes to your cloud workloads. This is where the Microsoft Azure Well-Architected Framework comes into the picture.

Join us for Well-Architected: The Backstage Tour, a virtual event where you will get five brief peeks at how we power the features that address each of these pillars of the Azure Well-Architected Framework. Not only will you learn how things work behind the curtain, but you’ll also take away some tips and tricks you won’t find anywhere else to help with these subjects.


Announcing private preview of authorized DoD Cloud Infrastructure as Code for Azure

In our continued commitment to help Department of Defense (DoD) customers keep pace with mission demands, we’re announcing the private preview of DoD Cloud Infrastructure as Code (IaC) for Azure – a set of preauthorized baselines that build standard environments in Azure Government to accelerate DoD adoption of cloud services.


Quantum-inspired algorithms and the Azure Quantum optimization service

Delbert Murphy joins Scott Hanselman to show how quantum-inspired algorithms mimic quantum physics to solve difficult optimization problems. Quantum-Inspired Optimization (QIO) takes state-of-the-art algorithmic techniques from quantum physics and makes these capabilities available in Azure on conventional hardware, and callable from a Python client. You can use QIO to solve problems with hundreds of thousands of variables, combined into millions of terms, in a few minutes, with this easy-to-consume Azure service.


Back to top



Windows Server 2022 is generally available

Azure Arc enabled Data services video series

Get a secure baseline architecture for Azure Kubernetes Service (AKS)

Guarantee capacity access with on-demand capacity reservations—now in preview

How To Rename an Azure Virtual Machine

Enable government missions in the cloud with Azure Government

Level up your Bicep skills on Microsoft Learn

Infra as Code in Action: Naming conventions

Infra as Code in Action: Secrets management

Azure & Desired State Configuration Part 3/4

Azure & Desired State Configuration Part 4/4

Hyper-V host already registered to Azure Recovery Vault Error

Windows Server Insider 2022 Datacenter Azure version

Running Azure Stack HCI on DataOn Integrated System All-NVMe Flash

Hyper-V Nested virtualization for AMD processors

Parsing JSON with PowerShell


Back to top



Automating Agent Load Balancing for Management Servers and Gateways

SQL Management Pack Queries

What account will command channel notifications Run As in SCOM?

Creating Groups of Windows Computers that CONTAIN an application or application property

Verify SQL Server Securables with SCOM Agent Task

Verify SQL Server Securables with PowerShell

SCOM – How to get Cluster Alerts from the Nodes, not the Virtual Computer

OMI Vulnerabilities in cross-plat management extensions


Azure webinar series – Enhance Hybrid Cloud Monitoring with Azure Monitor

Generally available: Azure Monitor support for Availability Zones

General availability: Cross service queries between Azure Monitor and Azure Data Explorer

Public preview: Distributed tracing for Java apps on Azure Functions Linux

Public preview: At-scale management of Azure Monitor alerts in Backup center

Azure Monitor Agent and Data Collection Rules now support Windows Server 2022

Deploy Azure Monitor Agent at Scale

Azure Monitor Agent, Microsoft Monitor Agent and Data Collection Rules

Alert Based on Log to Metrics Feature on Azure Monitor

Kusto Query: Compare the current counter value with previous one

Monitor ingestion with ADX Insights

Monitoring a Hot Tub or Pool with Azure Monitor and Azure Log Analytics

How to analyze data exported from Log Analytics data using Synapse

OpenTelemetry + Azure Monitor


Back to top




Best CMPivot Standalone App Deployment Guide using SCCM

New version of HPIA automation in a TS – MASHPIA

Free Readiness MECM Windows 11 Report

How to Monitor SCCM Scripts from Console and Reports

Important! – MEMCM enabling BitLocker during OSD post 2103

Windows 11 customizations a first look

Deploy Windows Admin Center using SCCM

How to Update SCCM Application Content

Report on Overlapping Boundaries in MECM

Export contents of a grid view using Configuration Manager Technical Preview 2108

MECM Client Content Downloads Report for Power BI

Best Method to Create SCCM Device Collection for Windows Server 2022

SCCM Resource Explorer Deep Dive Helps to Troubleshoot and Fix Issues

FIX: SCCM Application Installation Failed Unmatched Exit Code 1603

Fix Windows Cumulative Updates are not Showing up in SCCM Issue for September Patches

Quickly Check Registry Values using SCCM CMPivot Query


Microsoft Intune Feedback – Make your voice heard

What’s new in Microsoft Intune – September 2021

In development for Microsoft Intune – September 2021

Microsoft Graph permissions reference – September 2021
Intune Support Team – Twitter Feed

Silently Encrypt Devices using MEM during Autopilot

Support Tip: Known Issues with Intune policy reports

Back to School 2021-22 – Intune for Education

Updated support flow in Microsoft Endpoint Manager

Success with remote Windows Autopilot and hybrid Azure Active Directory join

Build a macOS onboarding splash screen with Microsoft Endpoint Manager and Octory

Windows Autopilot MFA changes to enrollment flow

End grace period for Cloud PCs

End-user hardware requirements to access a Cloud PC

Create Windows 11 Feature Update Deployment Policy

Easy Steps to Configure Intune Company Portal Application Icon

Configure Cloud PC RDP Properties using Intune Settings Catalog

Block USB Device Access using Intune

Easily Manage Microsoft Edge Extensions using Intune

Troubleshoot Microsoft Edge Security Policy Deployment issues with Intune

Quickly Disable Fast User Switching using Intune

Deploy Registry Fix using Intune Win32 App

Intune Security Baseline Microsoft Defender Policy Troubleshooting Tips for Cloud PCs

Download Intune CIS Benchmark for Windows 10


Back to top



How to Get the Network Security Dashboard for Security Center

How to Monitor for ProxyShell Microsoft Exchange Vulnerabilities using Azure Sentinel

Boost your network security with new updates to Azure Firewall


Back to top



Announcing Improved Identity Protection Signal Quality and Visibility

Announcing password removal for Microsoft accounts

Migrate your apps to access the license managements APIs from Microsoft Graph

Onboard partners more easily with new Azure AD entitlement management features

Secure access to Amazon Managed Grafana with Azure AD

HashiCorp’s Azure AD Provider Migrates to Microsoft Graph, Improving Performance and User Experience


Back to top



Migrating to SQL: New Conversion Reports in SSMA

Managing SQL Server Agent Jobs with Notebook Jobs in Azure Data Studio

Azure SQL VM: Using PerfInsights to Evaluate Resource Health and Troubleshoot

Enable Vulnerability Assessment on SQL Servers with Azure Policy

Enable Azure SQL Auditing with Azure Policy

Improve availability with zone-redundant storage for Azure Disk Storage


Back to top

Bu yazının kalıcı bağlantısı

Bir yanıt yazın

E-Posta adresiniz yayınlanmayacaktır.