Tag: windows 10 Page 1 of 2

Windows 10 and Office 2019 Announcements Highlight the Importance of Managing Updates

The last major releases of Windows and Office were Windows 10 and Office 2016, both released in 2015. In the years since then, both platforms have undergone rapid development, and seen a lot of changes made. Microsoft have changed how …

How to Use Azure Active Directory Conditional Access to Enforce Multi-Factor Authentication for Unmanaged Devices

Microsoft provides some different options for securing Office 365 and Azure applications with multi-factor authentication (MFA). For your end users you can choose from:

  • MFA for Office 365, which provides basic MFA functionality for Office 365 applications only.
  • Azure MFA,

[Script Of Jun. 12] How to create new Virtual Desktop in Windows 10 using PowerShell

Jun.
12
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/scriptcenter/How-to-create-new-Virtual-0e972c8d.

The sample code demonstrates how to create new Virtual Desktop in Windows 10 using PowerShell.

You can find more All-In-One Script Framework script samples at http://aka.ms/onescriptingallery

[Script Of May. 10] How to change Windows 10 Lock screen time format

May
10
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/How-to-change-Windows-10-1fe3a30b .

The sample code demonstrates how to change Windows 10 Lock screen time format.

You can find more All-In-One Script Framework script samples at http://aka.ms/onescriptingallery

How to Secure an ARM-based Windows Virtual Machine RDP access in Azure

 

Hi, Mark Rowe here, and I am the creator of Augmented Living, a Developer/Architect for Microsoft’s Modern Applications Solution Center as a senior consultant, and a long-time Microsoft fanboy and blogger.

One of the most hit aspects of security …

Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005

On March 14, 2017, Microsoft released security bulletin MS17-013 to address CVE-2017-0005, a vulnerability in the Windows Win32k component that could potentially allow elevation of privileges. A report from a trusted partner identified a zero-day exploit for this vulnerability. The …

Tax-themed phishing and malware attacks proliferate during the tax filing season

Tax-themed scams and social engineering attacks are as certain as (death or) tax itself. Every year we see these attacks, and 2017 is no different.

These attacks circulate year-round as cybercriminals take advantage of the different country and region tax …

[Script Of Mar. 20] How to create new Virtual Desktop in Windows 10 using PowerShell

Mar
20
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/How-to-create-new-Virtual-0e972c8d.

The sample code demonstrates how to create new Virtual Desktop in Windows 10 using PowerShell.

You can find more All-In-One Script Framework script samples at http://aka.ms/onescriptingallery

Ransomware operators are hiding malware deeper in installer packages

We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code. These …

Uncovering cross-process injection with Windows Defender ATP

Windows Defender Advanced Threat Protection (Windows Defender ATP) is a post-breach solution that alerts security operations (SecOps) personnel about hostile activity. As the nature of attacks evolve, Windows Defender ATP must advance so that it continues to help …

Breaking down a notably sophisticated tech support scam M.O.

The cornerstone of tech support scams is the deception that there is something wrong with your PC.  To advance this sham, tech support scams have long abused browsers’ full screen function. Coupled with dialogue loops, the pop-up messages that just …

MSRT February 2017: Chuckenit detection completes MSRT solution for one malware suite

In September 2016, we started adding to Microsoft Malicious Software Removal Tool (MSRT) a malware suite of browser modifiers and other Trojans installed by software bundlers. We documented how the malware in this group install other malware or applications silently, …

Identifying WaaS Systems Using Config Manager

Hey Everybody! I am Jose Blasac, a Microsoft Premier Field Engineer, here with my first post on the world famous ASK PFE Platforms blog! I am super excited!

I spend a lot of time working with System Center Configuration Manager

Ransomware: a declining nuisance or an evolving menace?

The volume of ransomware encounters is on a downward trend. Are we seeing the beginning of the end of this vicious threat?

Unfortunately, a look at the attack vectors, the number of unique families released into the wild, and the …

[Script Of Feb. 6] How to copy the favorites to Windows 10 Edge browser

Feb.
6
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/scriptcenter/How-to-copy-the-favorites-2e2de1d0.

The sample code demonstrates how to copy the favorites to Windows 10 Edge browser .

You can find more All-In-One Script Framework script samples at http://aka.ms/onescriptingallery

Averting ransomware epidemics in corporate networks with Windows Defender ATP

Microsoft security researchers continue to observe ransomware campaigns blanketing the market and indiscriminately hitting potential targets. Unsurprisingly, these campaigns also continue to use email and the web as primary delivery mechanisms. Also, it appears that most corporate victims are simply …

Exploit kits remain a cybercrime staple against outdated software – 2016 threat landscape review series

Despite the disruption of Axpergle (Angler), which dominated the landscape in early 2016, exploit kits as a whole continued to be a threat to PCs running unpatched software. Some of the most prominent threats, from malvertising to ransomware, used exploit …

Cool new things for Hyper-V on Windows 10

Insider build 15002 is now available for Fast Ring windows insiders. In it, you’ll find a few improvements in Hyper-V for Windows 10 users:

  • A new virtual machine Quick Create experience (work in progress).
  • More aggressive memory allocation for starting

[Script Of Jan. 9] How to backup Windows product key in Windows 10, Windows 8.1, Windows 8

Jan.
9
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/scriptcenter/How-to-backup-Windows-85379640.

The sample code demonstrates how to backup Windows product key in Windows 10, Windows 8.1, Windows 8.

You can find more All-In-One Script Framework script samples at …

Why Bitlocker takes longer to complete the encryption in Windows 10 as compared to Windows 7

Hello, my name is Ritesh Sinha and I am a Support Escalation Engineer on the Windows team.  Today’s blog will cover “Why Bitlocker takes longer to complete the encryption in Windows 10 as compared to Windows 7”.

A …

Remote Server Administration Tools for Windows 10

Hello everyone, my name is David Loder, long-time reader, first-time PFE blogger, based out of Detroit, Michigan. And I have a confession to make. I hate servers. Or more precisely I hate logging in to servers.

If you’ve been …

Basic Network Capture Methods

Hi everyone. This is Michael Rendino, a Premier Field Engineer from Charlotte, NC and former member of the CTS networking support team. With my networking background, I have spent years reviewing network captures. One thing I always run into with …

No slowdown in Cerber ransomware activity as 2016 draws to a close

As everybody else winds down for the holidays, the cybercriminals behind Cerber are busy ramping up their operations.

Following our discovery of a spam campaign that takes advantage of holiday shopping, we found two new campaigns that continue distributing …

Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe

Targeted attacks are typically carried out against individuals to obtain intellectual property and other valuable data from target organizations. These individuals are either directly in possession of the targeted information or are able to connect to networks where the information …

Windows 10: protection, detection, and response against recent attacks

A few weeks ago, multiple organizations in the Middle East fell victim to targeted and destructive attacks that wiped data from computers, and in many cases rendering them unstable and unbootable. Destructive attacks like these have been observed repeatedly over

Announcing Extended Support for WSUS 3.0 SP2

Hi everyone! Brandon Wilson here just passing along a friendly note that consumers of WSUS will probably be jumping for joy to hear. Nathan Mercer and Michael Niehaus have published some useful news in this blog post (contents can also …

Deep Dive: The Storage Pool in Storage Spaces Direct

Hi! I’m Cosmos. Follow me on Twitter @cosmosdarwin.

Review

The storage pool is the collection of physical drives which form the basis of your software-defined storage. Those familiar with Storage Spaces in Windows Server 2012 or 2012R2 will remember …

Fake fax ushers in revival of a ransomware family

“Criminal case against you” is a message that may understandably cause panic. That’s what a recent spam campaign hopes happens, increasing the likelihood of recipients opening the malicious attachment.

We recently discovered a new threat that uses email messages pretending …

Options for Installing and Maintaining Windows Applications

Starting with the Windows 1607 release, MSN News and MSN Finance are no longer included with the Windows installation, but they are still available via Windows Store.

For most, this change will be seamless.

  • If users upgrade from a previous

No payment necessary: Fighting back against ransomware

Any IT professional who’s ever had an experience with malware knows how fast an intrusive attack can happen, and how difficult it can be to educate employees to be vigilant against such threats. And with ransomware attacks only growing, having …

Script Of Oct. 28] How to automatically mount a VHD at Startup in Windows 10, Windows 8

Oct.
28
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/scriptcenter/How-to-automatically-mount-d623ce34.

The sample code demonstrates how to automatically mount a VHD at Startup in Windows 10, Windows 8, Windows 8.1.

You can find more All-In-One Script Framework script …

New Office Update to address some of the scaling issues with Skype for Business 2016 and PowerPoint 2016

Hi Everyone,

This is Kim Johnson from the Windows 10 client supportability team.  I wanted to share some exciting news around some new updates for display scaling issues in Skype for Business 2016 and PowerPoint 2016.  In previous blogs we …

MSRT October 2016 release: Adding more unwanted software detections

Unwanted software often piggy-backs on program downloads, delivered by software bundlers. These bundles, which you might have downloaded, can include software that you do not want, and some that are harmful.

The bundled or “extra” software can perform actions …

[Script Of Oct. 8] Remove Windows Store apps in Windows 8, Windows 8.1 and Windows 10

Oct.
8
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/scriptcenter/Remove-Windows-Store-Apps-a00ef4a4.

This script can be used to remove multiple Windows Store apps from a user account in Windows 8, Windows 8.1 and Windows 10. It provides a list …

Securing Credentials for Privileged Access

 

Hello, Paul Bergson back again. I have been on the road a bit more than normal doing security training/POC deliveries (POP-SLAM *1) for our customers related to Pass-the-Hash and credential protection. I have noticed an alarming trend in how credential …

[Script Of Sept. 22] How to automatically mount a VHD at Startup in Windows 10, Windows 8

Sept.
22
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/scriptcenter/How-to-automatically-mount-d623ce34.

The sample code demonstrates how to automatically mount a VHD at Startup in Windows 10, Windows 8, Windows 8.1.

You can find more All-In-One Script Framework script …

Stop using SMB1

Hi folks, Ned here again and today’s topic is short and sweet:

Stop using SMB1. Stop using SMB1. STOP USING SMB1!

Earlier this week we released MS16-114, a security update that prevents denial of service and remote code …

[Script Of Sept. 5] How to uninstall security update for Windows 10 (VBScript)

Sept
5
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/How-to-Uninstall-security-289840b3.

The sample code demonstrates how to uninstall security update for Windows 10 (VBScript).

You can find more All-In-One Script Framework script samples at http://aka.ms/onescriptingallery

[Script Of Sept. 1] How to Uninstall security update for Windows 10

Sept
1
image

Script Download:
The script is available for download from https://gallery.technet.microsoft.com/How-to-Uninstall-security-b66e43a6.

The sample code demonstrates how to Uninstall security update for Windows 10.

You can find more All-In-One Script Framework script samples at http://aka.ms/onescriptingallery

A Bit About the Windows Servicing Model

Hello, Paul Bergson back again with a discussion on the upcoming changes to our monthly patch releases to align down-level supported operating systems, updating practices to coincide with the Windows 10 Service Model. This includes Windows 7/8/8.1 and Windows Server

Using PowerShell Runspaces to Generate GPO Reports

Stephen Mathews here to talk to you about generating Group Policy Object reports quickly and efficiently. I had a customer ask me if there was an easy way to find all the RunOnce GUIDs in their GPOs. The customer was …

WPT: Peeking at Logon Delays

Hi everyone, Randolph Reyes (Randy) here with another blog contribution. In this particular engagement, I was working doing an Active Directory Offline Security Assessment (awesome delivery), and one employee with knowledge of using Windows Performance Toolkit stopped me on my

Determining the Dominant User and Setting the ManagedBy Computer Attribute

Hi again, this is Stephen Mathews and I’m here to talk about how to determine the dominant or primary user of a Windows operating system. This insight can help administrators facilitate direct communication with the affected user when a system

Establishing Network Connectivity to a Share in the Windows Recovery Environment

Hi there! My name is Neil Dsouza and I’m a Support Escalation Engineer with the Windows Core team.

Today I’m going to cover a scenario where you have a server that fails to boot and all you want to do …

Network Device Naming in Hyper-V

In Windows 10 and Windows Server 2016 we have introduced a set of new capabilities around managing virtual network adapters.  One of the really handy ones is network device naming.  This allows you to easily differentiate between different network adapters …

PowerShell FAQ: Top 5 Questions about PowerShell from the Field

Hi folks, my name is Thiago Cardoso and I deliver workshops and custom support for our customers related to PowerShell, and I wanted to talk to you today about the top 5 questions I receive in the field:

1. Is

Limited Periodic Scanning in Windows 10 to Provide Additional Malware Protection

Every month, Microsoft’s Malicious Software Removal Tool (MSRT) scans more than 500 million Windows devices for malware and malicious software. This tool aids in the detection and removal of malware from 1 to 2 million machines each time, even on …

Remote Desktop for Windows 10 exiting preview

I’d like to start by saying a big thank you to everyone who has installed and used our Microsoft Remote Desktop Preview client for Windows 10 and has provided us great feedback so far.

After a few months working on …

Malicious macro using a sneaky new trick

We recently came across a file (ORDER-549-6303896-2172940.docm, SHA1: 952d788f0759835553708dbe323fd08b5a33ec66) containing a VBA project that scripts a malicious macro (SHA1: 73c4c3869304a10ec598a50791b7de1e7da58f36). We added it under the detection TrojanDownloader:O97M/Donoff – a large family of Office-targeting macro-based malware that has been active for …

Preparing for DAC

Hello everyone. This is Randy Turner to share some insights learned with implementing Dynamic Access Control (DAC.) There are numerous posts which I will share at the end to discuss the steps to implement all the features covered by DAC, …

Installing Bash on Ubuntu on Windows 10 Insider Preview

Hello again, Allen Sudbring here Premier Field engineer in the Central Region. Today I want to talk about an exciting new feature coming with the Anniversary update to Windows 10 that was announced at the Build 2016 conference, Bash command …

Windows 10, Hyper-V and Wireless – a new way to make this all work

Anyone who has used Hyper-V on a laptop is familiar with the pain of configuring Hyper-V virtual networking with wifi networking.  In fact, I have written multiple blogs about this over the years.  Well, in recent builds of Windows 10 …

Digging deep for PLATINUM

There is no shortage of headlines about cybercriminals launching large-scale attacks against organizations. For us, the activity groups that pose the most danger are the ones who selectively target organizations and desire to stay undetected, protect their investment, and maximize …

Down and Dirty WinPE USB for Surface

Hi everybody! My name is Stephen Mathews and you may know me from my 3-part PowerShell Basics video series on Taste of Premier. Today I’m here to show how to create a bootable Windows PreInstallation Environment USB drive to …

PowerShell 5 MVA coming soon to a computer near you

SUMMARY: Microsoft Scripting Guy, Ed Wilson talks about recording a new Microsoft Virtual Academy series of videos with PFE Ashley McGlone.

Hello everyone, Microsoft Scripting Guy Ed Wilson here. Well, I can tell you this week has been absolutely incredible. …

Reading the fine print on the Protected Users Group

Hi all – This is Jerry Devore back again with a quick post on the “Protected Users” group.  As a PFE, I work with several enterprise customers who have a global presence, and have become very focused on protecting highly …

Use PowerShell 5.0 to create temporary files in the temp folder

Summary: Microsoft Scripting Guy Ed Wilson talks about using Windows PowerShell 5.0 on Windows 10 to create temporary files in the temporary folder.

 

Sometimes it is the little things that make life easier. You know, like a cereal …

Use PowerShell 5 to empty the recycle bin

Summary: Microsoft Scripting Guy Ed Wilson talks about using Windows PowerShell 5.0 to empty the recycle bin on Windows 10

 

It seems that now days when I talk to someone about Windows PowerShell 5.0 they get all excited …

Using the new PowerShell ISE transcript tool

Summary: Ed Wilson, Microsoft Scripting Guy, talks about using the new Windows PowerShell 5.0 ISE Transcript tool.

 

One of my favorite features for Windows PowerShell has always been the transcript tool. I mean, it seems like it was …

PFE Days: Microsoft Irvine office: Thursday, March 24th, 2016: Vital Signs Express featuring the CLUE

Hi all, 

If you guys are in the Irvine, Orange County area, stop by for 2-3 hours of automating the Windows client and server performance troubleshooting using CLUE.

• Have you been manually setting up Perfmon/PAL and Windows Performance Toolkit …

No mas, Samas: What’s in this ransomware’s modus operandi?

We’ve seen how ransomware managed to become a threat category that sends consumers and enterprise reeling when it hits them.  It has become a high-commodity malware that is used as payload to spam email, macro malware, and exploit kit campaigns.

New in Intune: Improved end user experience for iOS and other service enhancements

The Microsoft Intune team is always working on new features and service enhancements designed to help you more effectively manage apps and devices, and provide your end users with the seamless mobile experience they expect. This month, we’re excited to …

Secure Administrative Workstations

Hi All. This Jerry Devore a Midwest PFE back after a long hiatus from blogging.

If you thumb through the owner’s manual of your car you will find a maintenance schedule section.  There you can see how often the manufacture …

Disable VMConsoleSupport???

In Windows 10 / Windows Server 2016 we have two, rather odd, new PowerShell cmdlets:

Disable-VMConsoleSupport
Enable-VMConsoleSupport

These cmdlets respectively remove and add the video adapter, mouse and keyboard from the virtual machine (note – they only work on a …

Building your own integration service for Hyper-V

Over time many people have asked me how they can extend Hyper-V integration services.  There are all sorts of reasons for wanting to do this – maybe you want to build your own automation system, or maybe you want to …

Cleaners ought to be clean (and clear)

There are many programs that purport to clean up and optimize system performance. While Microsoft does not endorse the use of these tools with Windows, we do not view them as unwanted or malicious.

Many programs in this category have

Changes to Remote Management using Hyper-V Manager

In Windows 10 and Windows Server 2016 we have made some significant changes to the way Hyper-V Manager connects to a remote system.  From an end-user perspective there are a couple of new things that we now support:

  • You can

How to delete upgrades in WSUS

(Alternative title: “Help, I synched Upgrades before installing the patch!” This applies to anyone who missed KB 3095113 when it was offered as a hotfix, and subsequently enabled synching of Upgrades in their environment. The upgrades that…(read more)…

For those on WSUS 3.0 SP2 (or SBS 2011)

As indicated in a previous post , we are making changes to WSUS 4.0 and later that will provide a smoother Windows 10 servicing experience. Because WSUS 3.0 SP2 is already in extended support (receiving no support at all after …

Using the Windows 10 Compatibility Reports to understand upgrade issues

This blog discusses on how to obtain and review the Compatibility Reports to troubleshoot Windows 10 Upgrades.
On a PC that is eligible for the free upgrade offer, you can use the “Get Windows 10” app and choosing the “Check …

Remote Desktop Preview now available on Windows 10 Mobile and Continuum

Today’s update (version 844) of the Remote Desktop Preview client for Windows 10 adds support for both Windows 10 Mobile devices and Continuum for phone for compatible devices like the Lumia 950 or 950 XL. The client is still in …

Remote Desktop Protocol (RDP) 10 AVC/H.264 improvements in Windows 10 and Windows Server 2016 Technical Preview

Hello Everyone, this is Jeroen van Eesteren from the Remote Desktop team. I am writing you today to let you know about the graphics remoting enhancements we made to the Remote Desktop Protocol (RDP) version 10 which shipped with the …

Does your win 8.1 /2012 R2/win10 logon hang after a password change?

Hi, Linda Taylor here, Senior Escalation Engineer from the Directory Services team in the UK.

I have been working on this issue which seems to be affecting many of you globally on windows 8.1, 2012 R2 and windows 10, so …

Coming soon: Support for new Windows 10 features, Apple VPP for Business, and more

We will be releasing the next service update for Microsoft Intune between January 6 and January 14. New features and enhancements will be made available as part of this service update including:

  • Support for new Windows 10 features:
    • You can

Local Administrator Password Solution (LAPS) Implementation Hints and Security Nerd Commentary (including mini threat model)

Hi, Jessica Paynefrom Microsoft Enterprise Cybersecurity Group’s Global Incident Response and Recovery team guest starring on the Platforms PFE blog today.

Credential theft is a major problem in the security landscape today. Matching local administrator passwords in an environment …

Users can’t access the desktop and other resources through Quick Access in Windows 10

If you use copyprofile when customizing your Windows 10 profiles, you may encounter a scenario where pinned icons, such as Desktop under Quick Access for Windows 10 will not be accessible and users may encounter an issue similar to the …

Recovering from Failed Disks in Tiered Storage Spaces on Windows 10 via PowerShell

I have a Windows 10 workstation at home which has a tiered storage space with 2 SSD and 6 HDD.  I have a mirrored virtual disk using both tiers and I use this for regular storage, file sharing, and running

Update 1512 now available in System Center Configuration Manager Technical Preview

A little more than a week ago, we made the latest version of System Center Configuration Manager generally available , and we are very excited that many of our customers already upgraded to it! To provide continuous innovation, we have …

Display Scaling in Windows 10

Hope everyone is having a good day.  Today, we have a guest among us.  Steve Wright is a Senior Program Manager in the Developer Platform Group.  He is authoring this blog regarding scaling in Windows 10 with how it works

Now Generally Available: System Center Configuration Manager and Endpoint Protection (Version 1511)

Over the past few months we have been working to finalize the latest version of System Center Configuration Manager (ConfigMgr). We are excited to announce that this new current branch of System Center Configuration Manager and Endpoint Protection (version…(read

Now available: Updated System Center 2012 R2 Configuration Manager Toolkit

Author: Brian Huneycutt, Senior Software Engineer, Enterprise Client and Mobility An updated version of the Configuration Manager Toolkit is now available on the Microsoft Download Center. The new version, available here , addresses the following issues…(read more)

Microsoft assists law enforcement to help disrupt Dorkbot botnets

Law enforcement agencies from around the globe, aided by Microsoft security researchers, have today announced the disruption of one of the most widely distributed malware families – Win32/Dorkbot. This malware family has infected more than one million PCs in

Weekend Scripter: The Case of the Disappearing PowerShell Console

Summary: Ed Wilson, Microsoft Scripting Guy, talks about fixing a problem where his Windows PowerShell console disappears.

Microsoft Scripting Guy, Ed Wilson, is here. So there I was, on a two week trip, out of time, with only my …

Issue with the Windows ADK for Windows 10, version 1511

Author: Aaron Czechowski, Senior Program Manager, Enterprise Client and Mobility The Windows 10 ADK was recently updated on the Microsoft Hardware Dev Center, aligned with the Windows 10, version 1511 update. While this Windows ADK update addresses…(read more)…

Why are there two Hyper-V PowerShell modules in Windows 10?

If you use get-module in PowerShell on Windows 10 – you will see that there are now two Hyper-V PowerShell modules:

There is an important reason for this.

In the past we have never supported using Hyper-V PowerShell on one …

KMS Migration from 2008 R2 to Windows Server 2012 R2 and KMS Activation Known Issues

I’m receiving a lot of requests for assistance here lately around KMS. In short, the request goes something like this:

I use KMS for volume activation of Microsoft products. How do I migrate my KMS host from Windows Server 2008

Managing Windows 10 Device Guard with Configuration Manager

We are excited to share information on how to deploy Device Guard on Windows 10 devices managed by Configuration Manager, using existing capabilities in System Center 2012 R2 Configuration Manager SP1. Why Device Guard? Device Guard is a new feature…(…

Coming soon: New Intune features including Windows 10 EDP policies

We will be releasing the next service update for Microsoft Intune between October 28 and November 6. New features and enhancements will be made available as part of this service update include:

  • Windows 10 Enterprise data protection (EDP) configuration policies:

Top Support Solutions for Windows 10

These are the top Microsoft Support solutions for the most common issues experienced when using Windows 10.

1. Solutions related to the installation or upgrade to Windows 10 with free upgrade offer :

System Center Configuration Manager: Support for Windows 10 and Microsoft Intune

Author : Aaron Czechowski, Senior Program Manager, Enterprise Client and Mobility Windows 10 brings with it powerful new options for deployment and servicing. In System Center, we are committed to providing enterprise customers with best-in-class management…(read more)

Using a hypervisor to secure your desktop – Credential Guard in Windows 10

In Windows 10 we have some cool new technology where we use the Hyper-V hypervisor to provide an extra layer of protection to your desktop environment.  You can read all about this technology here: https://technet.microsoft.com/en-us/library/mt483740%28v=vs.85%29.aspx

I have also created a …

PowerTip: Group PowerShell Cmdlet Count by Version

Summary: Learn how to group Windows PowerShell cmdlet counts by version.

Hey, Scripting Guy! Question How can I see the version of the modules that contain various cmdlets in Windows PowerShell 5.0?

Hey, Scripting Guy! Answer Use the Get-Command cmdlet to return all of the cmdlets, and then …

Windows 10 Build 10565: Creating VMs with different versions

In Windows 10 we introduced the idea that you could have virtual machines with different versions.  Version 5.0 virtual machines were compatible with Windows 8.1 / Windows Server 2012 R2 – but did not have all the latest features – …

PowerTip: Get File System errors on NTFS Volumes with PowerShell

Summary: Use Windows PowerShell to get file system errors on all NTFS volumes.

Hey, Scripting Guy! Question How can I use Windows PowerShell to check your NTFS volumes for file system errors?

Hey, Scripting Guy! Answer On Windows 10 with Windows PowerShell 5.0, use the Get-Volume cmdlet …

Making a Little More Sense out of Windows as a Service and Windows 10 Branches

Greetings and salutations! Hilde here to chat a bit about Windows as a Service (WaaS) and the “Branch” concept in Windows 10 … and vent windows.

However, before we get into today’s discussion, I have to ask if you are …

Setting up Data Recovery Agent for Bitlocker

You might have already read on TechNet and one of the other AskCore Blogson how to setup Data Recovery Agent (DRA) for BitLocker. However, how do you request a certificate from internal Certificate Authority (AD CS) to enable Data …

How to convert Windows 10 Pro to Windows 10 Enterprise using ICD

Windows 10 makes life easier and brings a lot of benefits in the enterprise world. Converting Windows 10 without an ISO image or DVD is one such benefit. My name is Amrik and in this blog, we’ll take an example …

Now Available: October Update for System Center Configuration Manager Technical Preview 3

Today, we are making available update 1510 for System Center Configuration Manager Technical Preview 3 . This new update brings with it an early view of the new Windows 10 Servicing node, which enables you to view the state of …

Nested Virtualization in Windows 10 Build 10565

A little while ago we announced that – in order to help people run Hyper-V Containers on their existing infrastructure – we would be adding support for nested Hyper-V.

Well – yesterday we flighted the first build with this capability …

PowerShell 5 Class Inheritance and Overrides—The Video

Summary: Ed Wilson, Microsoft Scripting Guy, presents a video to talk about Windows PowerShell 5.0 class inheritance and property overrides.

Microsoft Scripting Guy, Ed Wilson, is here. This weekend, the Scripting Wife and I went to the air show …