Sertaç Topal
Nereye Ulaşmak İstiyorsanız Beraber Gidelim
Office 2019 KMS Üzerinden Aktivasyon
Verifies that the version of Microsoft SQL Server Native Client installed on the site server meets the minimum requirements to enable TLS 1.2 support
23 Aralık 2018
SYSTEM CENTER OPERATIONS MANAGER
Using PowerShell to add update and delete Class instances in SCOM
Sync SCVMM Hosts to SCOM Groups
Version agnostic Management Packs
How to discover and monitor a clustered application
System Center 2019 – What’s New
Updated – Using MP Viewer to unseal or export MP to XLS or HTML
Updated – SCOM Maintenance Mode PowerShell
XML for Product or Company Knowledge
The case of undiscovered SQL server roles in SCOM
A case of ghost objects in SCOM
System Center Management Pack for Windows Server Cluster
SCOM Management Pack Creator V2.0
Back to top
AZURE MONITOR
Azure Monitor for containers now generally available
Understanding health criteria in Azure Monitor for VMs
Azure Monitor: Detecting and Alerting on File Changes
Add Custom Performance Counters Log Analytics
Automatic Remediation Tasks in the Hybrid Environment
Pluralsight Course: Microsoft Azure Developer: Monitoring Performance
Create custom KPI dashboards using Azure Application Insights
Must Install Azure Monitor Solutions
Parse text data in Azure Log Analytics
Ingestion Time in Log Analytics
Kusto Query Language with Azure Notebooks and Azure Data Explorer
Azure Monitor: introduction to monitor service for virtual machines
How to view container logs real time with Azure Monitor for containers
Create functions in Application Insights through REST API
Best practices for queries used in log alerts rules
Finding Diagnostic Logs for Azure Services
Automatic Performance monitoring in Azure SQL Data Warehouse preview
Monitor your BBQ with Powershell and Azure Log Analytics
SYSTEM CENTER CONFIGURATION MANAGER
System Center Configuration Manager Feedback
Update 1810 for Configuration Manager current branch is now available
SQL Server Native Client Update Warning Prerequisite for ConfigMgr 1810
ConfigMgr Application Approval via Email
Using Fully Qualified Domain name for remote control
Application approval improvements in ConfigMgr 1810
Add PowerShell script content directly in the TS Editor using ConfigMgr Technical Preview 1811
Cabana Sessions with ConfigMgr Technical Preview 1812
Keeping the SCCM Cache Clean with DCM
Launch Application during Task Sequence
SCCM Logs and Quick Tips to Read Logs
Create SCCM Application Phased Deployments
The value of bandwidth and peer caching with ConfigMgr
Approve SCCM Application Requests via Email – SCCM 1810 Feature
Configure Email Notification in SCCM Configuration Manager
SCCM 1810 Prerequisite Check Failed – Fix for Error and Warnings
SCCM 1810 Upgrade Video Guide – Best Practices
SCCM Integration with Azure Log Analytics with OMS Connector
INTUNE / ENTERPRISE MOBILITY
How Microsoft uses Conditional Access – The Endpoint Zone with Brad Anderson
Rule your inbox with Microsoft Cloud App Security
How does Microsoft Intune transform Android enterprise management? Let me count the ways
Microsoft is a Leader in The Forrester Wave™: Unified Endpoint Management, Q4 2018
Intune Device Management – Removing Local Admins in Windows 10 Devices
Reduce your potential attack surface using Azure ATP Lateral Movement Paths
VIRTUALIZATION
Azure Stack customer journey
Virtual Network Service Endpoints for serverless messaging and big data
Improving Azure Virtual Machine resiliency with predictive ML and live migration
An easy way to bring back your Azure VM with In-Place restore
DATA PROTECTION
Microsoft Azure Backup Server(MABS) V3 is now available
Azure Backup can automatically protect SQL databases in Azure VM through auto-protect
Azure Backup Server now supports SQL 2017 with new enhancements
Apply the latest Azure Site Recovery capabilities with automatic agent update
Disaster recovery of zone pinned Azure Virtual Machines to another region
SECURITY
Security best practices for Azure solutions
Protect your network resources in Azure Security Center
Evolution of Microsoft Threat Protection – December update
How to help maintain security compliance
Top 10 actions to secure your environment
Phishing with the sharks using Attack Simulator
Secure Privileged Access with phased roadmap
Windows Defender ATP device risk score exposes new cyberattack, driving conditional access
Windows Defender ATP has protections for USB and removable devices
Advanced Persistent Threat – What is It, How to Detect It
Bu yazının kalıcı bağlantısı https://www.sertactopal.com/system-center-aralik-2018-bulten
E-Posta adresiniz yayınlanmayacaktır.
Δ