Like TechNet UK on Facebook
TechNet Team Blogs
Recently IT Pro publication released a new report on Big Data… Does it represent a big opportunity or even bigger problem when it comes to your business?
You can download the report here:
Download the report now
täglich entstehen mehr Clouddienst und jeder Cloud-Anbieter von Clouddiensten hat sein eigenes Management Portal. Warum kann man nicht alles von einer Stelle verwalten?
Geht nicht, gibs nicht. Mit System Center 2012 Service Pack 1 kann man unterschiedliche Cloud’s verwalten.
Für Windows Azure gibt es on top ein Windows Azure Integration Pack für Orchestrator in System Center 2012 SP1.
auf der Strata Conference + Hadoop NYC 2012 hat das Microsoft Big Data Team die CTP veröffentlicht:
1. “Hadoop on Azure” trägt künftig den Namen: Windows Azure HDInsight Service
2. “Hadoop on Windows” ist als CTP/Preview verfügbar und trägt künfigt den Namen: Microsoft HDInsight Server
Microsoft HDInsight Server unterstützt in der CTP die Systeme:
Microsoft HDInsight Server CTP findet man auf dem Microsoft BigData Portal:
Die Installation ist kinderleicht über den Web Plattform Installer 4.0.
Danach steht einem die Big Data Welt von Hadoop offen:
Weitere Details zur Installation und wie man Lösungen auf Hadoop erstellt, findet man unter:
oder auf dem Blog von:
oder auf dem Blog von:
ich habe eben den Technet-Artikel gefunden. Noch brandneu… (published: 16. Oktober 2012).
Changes from SharePoint 2010 to SharePoint 2013
Der Artikel umfaßt folgende Punkte:
Features deprecated in SharePoint 2013
SharePoint Foundation 2010 deprecated search features
SharePoint Server 2010 deprecated search features
FAST Search Server 2010 for SharePoint deprecated features
Sehr zu empfehlen für jedes SharePoint Upgrade Projekt.
Windows8 ist da und wer ein Media Center im heimischen Wohnzimmer hat, hier der Link zum kostenlosen Download…(nur für kurze Zeit)
Bis 1.11.2013 gibt es ein eBook rund um Windows8:
Heinrich Van Der Westhuizen is a technology entrepreneur with more than 17 years’ experience in IT and has managed different businesses within Europe across multiple IT disciplines. Heinrich works for Digital Defence who provide mobile defence solutions.
Secure Mobile, encrypts and protects selected data and centrally enforces security policies on mobile devices – Secure Mobile is a true enabler for Mobility.
TechNet UK invited Heinrich to provide the details of what Digital Defence is as we know that many of you are interested in your staff being able to use devices on your systems anywhere. When looking at corporate owned devices the technology provided by Digital Defence provides a potential solution when looking at security for this environment. Hear from Heinrich about this technology and how it may be applicable in your organisation.
How Secure Mobile Works
Secure Mobile provides real-time encryption of persistent data using 128 or 256 bit AES encryption employing the XTS cipher mode which has been FIPS 197 certified. This is a relatively new cipher mode for encryption specifically designed for at-rest data. Persistent data refers to any data which remains persistent after a factory reset of a handheld device (i.e. storage cards or persistent local folders such as the /application folder on Motorola devices). The encryption is seamless to the user, meaning all encrypted data is encrypted and decrypted in real-time by use of a file system filter driver. Each file is encrypted using a different encryption key to another. Each file’s encryption key is determined by data part stored in a file’s contents, part (securely) stored in the device’s registry. The encryption key data is protected by device authentication which integrates with the Microsoft LASSD system.
Encrypted data access can be restricted to specific applications to ensure unknown (or undesired) applications will never be able to access the encrypted data. This is achieved by White Listing (and Black Listing) applications from execution and encryption access. All data connection ports are protected using Secure Mobile’s Access Control module. This ensures all means of transferring data to and from the device can be restricted to only secure channels. WWAN, WLAN, and USB channels can all be White Listed to ensure only specific secure networks (or connections) are used for data transfer.
How Secure Mobile Works II (File System Driver vs. File Vault)
Strictly speaking, we are not a “File Vault”. A File Vault is a single file that appears to the user as a folder location. So the storage folder is stored internally as a single file.
Secure Mobile uses a file system filter driver. This means we intercept all file reads and writes effectively acting as a second file system driver in the Kernel.
We only encrypt storage locations that remain persistent after a clean boot (factory reset). This includes local storage areas which are flagged as persistent (or permanent). On Motorola devices this is the “\application” folder.
We do not encrypt local storage folders that are wiped after a factory reset (i.e. the “\windows” folder).
Yes our solution is system wide. In this way, Secure Mobile is independent of any applications installed. Any time an applications tries to read or write data it is automatically decrypted and encrypted without the application needing to worry about it (or even being aware of it). Of course if you Black List an application from encryption then that application cannot read and write data to the locations marked for encryption.
If Storage Cards are marked to be encrypted, then every single file on a storage card will be encrypted.
If Local Persistent folders are marked to be encrypted then every single file on local persistent folders will be encrypted.
Device Wipe with Secure Mobile
Secure Mobile provides the ability to set a security policy which will force a device wipe as a result of a "security compromise". Secure Mobile can force a device wipe if: - a user is locked out of the device after X failed login attempts. - a user has not used the device for X days. - a user has not connected the device to a pc for X days. Secure Mobile does not currently provide the ability to immediately "Remote Wipe" a device. Secure Mobile can be setup to keep data on storage cards during a device wipe. A device wipe will attempt to delete every file and registry entry. A device wipe will result in a mobile device which cannot be used due to the removal of key system files and registry entries. The result is that the device needs to be factory reset (clean boot).
I was invited to attend the EMEA Dell Partner Direct conference in Madrid last week, specifically to represent Microsoft, alongside Vmware at a discussion about consumerisation, hosted by Dell Wyse. There has been much written about this, the decline of laptop sales as other form factors such as phones and tablets go from strength to strength, so I don’t intend to paraphrase that.
However one question from the floor got me thinking and it was about the cost and speed of internet connectivity while we are out of the office. Simon and I have a lot of experience of this when we are trying to run our camps and this is despite trying to arrange connection in advance and paying considerably for them. We can also get stuck when we are just trying to do our other work in hotel rooms, at service stations and departure lounges.
So for many of our camps we have our demos with us, and for me this is my mighty “Dell-asaurus” a bright orange laptop (m6500) with 32Gb of RAM 3 x SSDs etc. etc. In fact we normally have several of these beasts to show off things like virtual machine mobility in Windows Server 2012, rather than rely on the servers we have back at the office. However if I am lucky enough to get a decent connection then I can get mail and chat on Lync, and best of all get back to the office file shares, and sites with DirectAccess, because we have standardised on Windows 8 clients with Windows Server 2012 servers.
So my advice is to pray for the connected cloud but plan to use a disconnected device like a PC.
However unless you want to show 20 virtual machines running all at once you don’t need to lug a round a huge laptop to work offline, You could simply carry a properly configured (and encrypted memory stick) with which you can boot from on any Windows 7 or 8 compatible PC. To find out about that and the other things we can do if and when your remote workforce have a connection to the office you’ll need to come to our latest round of Windows 8 IT Pro camps which will be focused on Windows 8 on the enterprise. Actually that also means we’ll be showing you the client aware features of Windows Server 2012 that we left out of our last round of server camps such as:, DirectAccess, Branch Cache, VDI, Dynamic Access Control etc. and so you might also need a laptop if you want to evaluate that ( note you can download a Windows Server 2012 trial here).
Finally if we get good internet at our camps Simon also plans to show you how to work with the Windows 8 store, and PC management using Windows InTune,
die nächste Roadshow steht in den Startlöchern. Mit dem Dynamic Infrastructure Day finden Sie heraus wo Ihre Einsatzszenarien in der Cloud sind. Erhöhen Sie Ihre Agilität und Flexibilität in IT-Systemen indem sie Dienste für immer oder nur temporär in die Cloud auslagern und dynamisch auf Ressourcenanforderung am Tag reagieren können. Am Ende des Tagen werden sie in der Lage sein Ihre Umgebung nach den 4 Kriterien skalieren zu können:
Lernen Sie an einem Tag alle Grundlagen, wie Sie Ihre Infrastruktur dynamisch in die Cloud auslagern und eine möglichst effiziente Ressourcenverteilung durchführen können. In praktischen Workshop-Teilen können Sie selbst ausprobieren, wie Sie sich bei Windows Azure anmelden und Ihre Cloud-Dienste verwalten und konfigurieren können. Außerdem erstellen und administrieren Sie eigene virtuelle Maschinen und Netzwerke in der Cloud und nutzen PowerShell Skripte zur Durchführung automatisierter Prozesse.
Wo & Wann: 13.11. Bad Homburg 19.11. Unterschleißheim 29.11. Köln 04.12. Berlin
Wir sehen uns.
PS: Was werden wir einsetzen? Windows Server 2012, SQL Server 2012, SharePoint 2013…. auf Windows Azure
im neuen Training Kit zu Windows Azure werden Developer- und ITPro Administratoren-Szenarien vorgestellt. Das Training Kit kann man herunterladen und installieren oder auf GitHub Windows Azure TrainingKit direkt durchschmökern.
Für alle DBAs für SQL Server: mit Azure Virutal Maschines ist der SQL Server auf dem Infrastructure as a Service-Ebene verfügbar:
Und last but not least: eine Best-Practice Beschreibung wie an SQL Server als virtuelle Machines auf Azure Virtual Machines einrichtet:
Hinweis: tempdb auf D-Drive: die Platte ist super schnell, direkt attached an die VM und kostenlos. ideal für eine tempDB
Anbei noch ein paar sehr gute Trainings:
WindowsAzure ITPro Overview mit Scale-Ansätzen zum self-Provisioning
Für den SQL Entwickler: What’s new on Azure SQL Datenbanken:
weiteren Themen für Azure:
Deploying Active Directory Manage VM via PowerShell Windows Azure Virtual Machines Network Load Balancing mit Azure Configuring a custom domain name for a Windows Azure cloud service or storage account (Tipp: im CloudService laufen die AzureVMs, d.h. somit ist es möglich die Domain von contoso.cloudapp.net auf www.contoso.com zu verändern
Mike Howard is the Chief Security Officer at Microsoft. In this article Mike provides a powerful insight into how Microsoft runs it’s security operation on a global basis.
At the end of 2010 Microsoft Global Security was at a crossroads, how could we meet the continuing needs of our business to deliver a world class secure working environment, while remaining efficient, driving down our costs and improving productivity by using scalable and extensible solutions.
We realized that the cloud was the most viable option to help meet our goals, and we would need a strategy to understand, develop and put in place cloud security. Fortunately, for us the needs of Global Security and the business of Microsoft were in alignment. For MSGS, cloud technology is a priority, it wasn’t mandated – we chose it, understanding the benefits it would provide.
Cloud innovation can be compared to the development of the printing press – in that in the security cloud, users can consume security applications without owning the infrastructure, just as readers of books do so without owning a printing factory. Cloud technology, lowers or eliminates the transaction cost of existing functions. It enables previously unthinkable functions to become affordable because they can be delivered on a mass scale, in a cost effective manner.
When we looked at the cloud, the questions we asked were:
This business value has come in many forms.
For example; during a crisis situation abroad, we can use the cloud to quickly visualize where traveling Microsoft employees are. The cloud provides relevant information from several sources at once, in a few clicks Global Security knows who needs to be contacted, and where. With cloud based partner apps from conTgo, MapCast and IDV Visual Command Center we are better able to save lives because having the right information enables quick response which is key in life threatening situations. Here is an example of how we used these tools during the Arab Spring
Going forward there is greater flexibility and opportunity to deliver many new security functions with real-time data, as a consumable experience to anybody, anywhere, anytime. There are also new opportunities for functions that have yet to become mainstream and the cloud is an ideal mechanism to deliver them as-a-service.
As we reached the realization that apps as we know them today will become a consumable service, the Cloud became an “all-in” proposition for Global Security. Good things are built on a solid foundation. The reality is that the foundation requires the right environment in which it can be developed and tested and Microsoft provides that environment.
As we continue our journey to the cloud, we’re exploring new possibilities for the delivery of security services on platforms and devices that did not exist even a short time ago. The possibilities that this family of devices and platforms offer are phenomenal, and even more exciting, is the opportunity to make a meaningful difference when it comes to saving lives. This sharpens our focus.
Chief Security Officer - Microsoft
Try out Windows Azure for free and see how you can benefit from high availability and flexible resources.
Find out more about how Microsoft Global Security uses technology