Learn how to perform core administrative tasks on the Azure Cosmos DB using Azure PowerShell.The post Interact with Azure Cosmos DB with PowerShell first appeared on 4sysops.
Get familiar with Azure Status dashboard, Azure Service Health, Service Health Alerts, Azure Resource Health, and Azure Resource Graph to ensure you're never surprised by a planned or unplanned outage that could affect your Microsoft Azure deployments.The post Azure health services: Track Microsoft cloud outages and maintenance first appeared on 4sysops.
As workers transition to remote environments, they need to have a mobile device management (MDM) platform uninhibited by connectivity to the corporate network. Microsoft Intune is a cloud-based service that provides effective MDM and mobile application management (MAM).The post Enroll Windows 10 machines in Microsoft Intune and manage them using the MDM interface first appeared on 4sysops.
The Amazon CloudWatch Agent enables you to collect metrics, custom metrics, and logs from within Windows and Linux EC2 instances. This step-by-step guide explains how to install and configure the Amazon CloudWatch Agent on EC2 instances.The post Install and configure Amazon CloudWatch Agent on EC2 instances first appeared on 4sysops.
Azure policies are becoming increasingly popular, as they provide a wide range of management capabilities over Azure resources. Not only do they allow us to enforce policy rules to control Azure resources, but they can also enable us to automatically evaluate compliance and remediate noncompliant resources. In this post, we will look at how to manage Azure Policy using PowerShell for common tasks, including creating policy definitions, managing policy assignments, and reporting compliance status.The post Manage Azure Policy using PowerShell first appeared on 4sysops.
Microsoft recently unveiled the Windows 365 platform. It is a new solution that provides a streamlined way for businesses, large and small, to set up a cloud-based Windows PC. It is a fresh take from Microsoft on the concept of VDI and how it is implemented, billed, and serviced.The post Step by step: How to deploy a Cloud PC with Windows 365 first appeared on 4sysops.
Traditional email signatures can create challenges for both end users and IT admins. This post looks at features of CodeTwo Email Signatures for Office 365 and how it solves these challenges for Microsoft 365.The post CodeTwo: Centrally manage email signatures for Microsoft 365 first appeared on 4sysops.
Understanding mail flow reports available in the Microsoft 365 Exchange Admin Center is essential for troubleshooting mail flow issues, reviewing email traffic, and formulating your security policies for mail flow; these are everyday tasks for Exchange admins. Mail flow reports can not only help you in these tasks but also give you early indications of impending issues.The post Microsoft 365 mail flow reports in the Exchange Admin Center first appeared on 4sysops.
Microsoft has announced yet another cloud service for virtual desktops called Windows 365. The main difference between this and Windows Virtual Desktop is that this service allows PCs to be provisioned and managed more easily. In addition, licensing is handled through a subscription per user and month.The post Microsoft Windows 365: Fixed-price cloud PC with simplified deployment first appeared on 4sysops.
Group policies play a central role in the management of Microsoft Office, especially for security configuration. The cloud policy service allows admins to customize Office apps via an M365 service, even if the PCs are not members of a domain.The post Manage Microsoft 365 Apps for Enterprise (Office ProPlus) using the cloud policy service first appeared on 4sysops.
In this article, you will learn how to use the Microsoft 365 Attack simulation training tool effectively. By the end of this post, you will know how to launch simulated attacks in your tenant, analyze the results, and take preventive measures. By doing so, you will harden the security of your environment in the long run.The post Understanding Microsoft 365 Attack simulation training first appeared on 4sysops.
Webhooks, which send data in JSON format over HTTP, are ideal for informing systems about events. This can be used, for example, to notify Microsoft Teams about events and store them in an action card. Actions for problem solving can also be included.The post Use case for action cards: Send low storage space alert to Microsoft Teams and start WAC to fix the problem first appeared on 4sysops.
If you have to create several identical VMs that deviate significantly from the wizard's defaults in the Hyper-V Manager, it results in a lot of manual work. Alternatively, PowerShell offers cmdlets for this purpose that can add and configure virtual hardware, such as network adapters or VHDs.The post Creating and configuring a virtual machine completely with PowerShell (using Azure Stack HCI as an example) first appeared on 4sysops.
Reply All storms have been a nuisance that was left unchecked for a long time. Microsoft has finally decided to crack down on this rather reprehensible aspect of Exchange. In this article, you will be introduced to the Reply All Storm Protection component of Microsoft 365. You will also learn the tenant-level settings that you can now modify to control and manage this feature.The post Reply All Storm Protection settings in Microsoft 365 first appeared on 4sysops.
Microsoft's Conditional Access is an Azure Active Directory (AAD) feature that increases security with remote and "work from anywhere" employees. Businesses can restrict access to cloud resources depending on the conditions of a remote worker's connection. This article will show you how to define such policies.The post Conditional Access: Create policies to secure cloud resources using AAD authentication first appeared on 4sysops.
Shortly after releasing Windows Admin Center (WAC) 2103, Microsoft released the minor update 2103.2. It introduces some interesting new features, mainly for Azure Stack HCI, but other tools also benefit from it.The post Windows Admin Center 2103.2: Cluster-aware update, Kubernetes Service for Azure Stack HCI, extension for Windows Time Service, update for Events tool first appeared on 4sysops.
This step-by-step guide explains how to create a hybrid DNS solution between AWS and an on-prem network using AWS Route 53 Resolver endpoints. That integration enables you to resolve DNS records in AWS Route 53 private hosted zones/VPCs from the on-prem network and to resolve DNS records in the on-prem network DNS from AWS services hosted in VPCs.The post Hybrid DNS between AWS and on-prem with AWS Route 53 Resolver first appeared on 4sysops.
The Microsoft 365 Threat protection status report is an amalgamation of several Exchange Online security reports that contain information about malicious messages detected by Exchange Online Protection (EOP) and Office 365 ATP. This article gives an overview of the Threat protection status report.The post Understanding the Microsoft 365 Threat protection status report first appeared on 4sysops.