Quantcast
Channel: TechNet Blogs
Viewing all 17778 articles
Browse latest View live

Released: Exchange Server 2013 Service Pack 1

$
0
0

Exchange Server 2013 Service Pack 1 (SP1) is now available for download! Please make sure to read the release notes before installing SP1. The final build number for Exchange Server 2013 SP1 is 15.00.0847.032.

SP1 has already been deployed to thousands of production mailboxes in customer environments via the Exchange Server Technology Adoption Program (TAP). In addition to including fixes, SP1 provides enhancements to improve the Exchange 2013 experience. These include enhancements in security and compliance, architecture and administration, and user experiences. These key enhancements are introduced below.

Note: Some of the documentation referenced may not be fully available at the time of publishing of this post.

Security and Compliance

SP1 provides enhancements improving security and compliance capabilities in Exchange Server 2013. This includes improvements in the Data Loss Prevention (DLP) feature and the return of S/MIME encryption for Outlook Web App users.

  • DLP Policy Tips in Outlook Web App – DLP Policy Tips are now enabled for Outlook Web App (OWA) and OWA for Devices. These are the same Policy Tips available in Outlook 2013. DLP Policy Tips appear when a user attempts to send a message containing sensitive data that matches a DLP policy. Learn more about DLP Policy Tips.
  • DLP Document Fingerprinting – DLP policies already allow you to detect sensitive information such as financial or personal data. DLP Document Fingerprinting expands this capability to detect forms used in your organization. For example, you can create a document fingerprint based on your organization’s patent request form to identify when users are sending that form, and then use DLP actions to properly control dissemination of the content. Learn more about DLP Document Fingerprinting.
  • DLP sensitive information types for new regions – SP1 provides an expanded set of standard DLP sensitive information types covering an increased set of regions. SP1 adds region support for Poland, Finland and Taiwan. Learn more about the DLP sensitive information types available.
  • S/MIME support for OWA – SP1 also reintroduces the S/MIME feature in OWA, enabling OWA users to send and receive signed and encrypted email. Signed messages allow the recipient to verify that the message came from the specified sender and contains the only the content from the sender. This capability is supported when using OWA with Internet Explorer 9 or later. Learn more about S/MIME in Exchange 2013.

Run the complete blog at http://blogs.technet.com/b/exchange/archive/2014/02/25/exchange-server-2013-service-pack-1-available.aspx

Read my favorites blogs:

Assigning File Share permissions using Power Shell

Disk Read Error when migrating virtual machine from one cluster to another

Designing a backup less Exchange 2010 Architecture

Appear Offline in Microsoft Office Communicator Server 2007

Microsoft Exchange 2010 Test cases

Microsoft Exchange Server 2010 Disaster Recovery


‘Plants vs. Zombies Garden Warfare’ turf battle now on Xbox One

$
0
0

“Plants vs. Zombies Garden Warfare” is out on Xbox One first, with a new take on third-person action as the two sides dig into the trenches, writes Xbox Wire. Among the key features: 24-player multiplayer action and four-player online co-op.

Watch the video above to get Major Nelson’s tips and tricks for the game, and to read more, head over to Xbox Wire.

You might also be interested in:

· Red Bull TV comes to Xbox 360, along with improved WWE app
· Get 100 GB of OneDrive storage through new Bing Rewards special offer
· Wonder what the innovators do in their off time? They tinker. In The Garage.

Suzanne Choney
Microsoft News Center Staff

KB: Information about installing Virtual Machine Manager and App Controller on same computer

$
0
0

KB

It is possible to install Microsoft System Center 2012 Virtual Machine Manager (VMM 2012) and App Controller on the same computer, although as a best practice and for better performance we recommend that you install these server roles on separate computers.

However, if you must install both server roles on the same computer, we recommend that you use one of the following methods…

For all the details please see the following:

KB2933853 - Information about installing Virtual Machine Manager and App Controller on same computer (http://support.microsoft.com/kb/2933853)

J.C. Hornbeck| Solution Asset PM | Microsoft GBS Management and Security Division

Get the latest System Center news onFacebookandTwitter:

clip_image001clip_image002

System Center All Up: http://blogs.technet.com/b/systemcenter/
System Center – Configuration Manager Support Team blog: http://blogs.technet.com/configurationmgr/
System Center – Data Protection Manager Team blog: http://blogs.technet.com/dpm/
System Center – Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
System Center – Operations Manager Team blog: http://blogs.technet.com/momteam/
System Center – Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center – Virtual Machine Manager Team blog: http://blogs.technet.com/scvmm

Windows Intune: http://blogs.technet.com/b/windowsintune/
WSUS Support Team blog: http://blogs.technet.com/sus/
The AD RMS blog: http://blogs.technet.com/b/rmssupp/

App-V Team blog: http://blogs.technet.com/appv/
MED-V Team blog: http://blogs.technet.com/medv/
Server App-V Team blog: http://blogs.technet.com/b/serverappv

The Forefront Endpoint Protection blog : http://blogs.technet.com/b/clientsecurity/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

OpenID Connect is Now Final!

$
0
0
Howdy folks, Today is an important day for digital identity, since OpenID Connect has been approved as a final specification . As those of you who follow this blog know, widely-available secure interoperable digital identity is the key to enabling easy-to-use, high-value cloud-based services for the devices and applications that people use. OpenID Connect fills the need for a simple yet flexible and secure identity protocol and also lets people leverage their existing OAuth 2.0 investments...(read more)

Bing Maps adds dual labeling, broader language support

$
0
0

bingmaps

Bing Maps announced the preview release of dual labeling, “neutral ground truth” (ngt) and additional language support on Wednesday. This update to the AJAX Version 7.0 control allows developers to create maps with labels in two different languages.

This map style can be useful in situations where a user does not know the local language. Showing labels in both the user’s native language and the local language can help with simplicity and comprehension.

In addition, the Bing Maps team has added support for the following languages:

  • de-AT German-Austria
  • de-CH German-Switzerland
  • fr-CH French-Switzerland
  • ko-KR Korean-Korea
  • pl-PL Polish-Poland
  • ru-RU Russian-Russia
  • zh-HK Chinese-Hong Kong SAR
  • zh-TW Chinese-Taiwan

To learn more about how to create a map with dual labels, head over to the Bing Maps Blog.

You might also be interested in:

David Chen
Microsoft News Center Staff

Data Visualizations

$
0
0

A couple of weeks back was a really exciting time for us. Less than a year after we released Office 365 for Businesses, we announced the general availability of Power BI for Office 365. You may have read previous blog articles by Quentin Clark on Making Big Data Work for Everyone and Kamal Hathi on Simplifying Business Intelligence through Power BI for Office 365. In this article, we’ll outline how we think about visualizations.

Why Visualizations Matter

While a list of items is great for entering or auditing data, data visualizations are a great way to distill information to what matters most that is understandable quickly. They work by engaging visual parts of our brains, which are inherently designed to detect patterns quickly. On the left, for example, we have a list of research grants, on the right a summarization of the overall amounts by month of the year. As you can see, visualizations are great for making us all more productive with data.

Visualizations in Productivity Apps

We have the privilege of having the largest community of users of productivity applications in the world. Thanks to their ongoing feedback, we are able to understand their changing needs, and ensure Office evolves in directions our customers find most useful.

Back in the early days of computing, graphics and visualizations were not mainstream capabilities.  Most machines lacked the graphics horsepower and memory needed, and people had to draw illustrations and charts by hand which was time consuming and fraught with mistakes. That all changed when the Macintosh and PCs made graphics a first class citizen. Microsoft introduced Microsoft Chart in 1984, and in 1985 as a feature in Mac Excel 1.0. 

Advertisement, September 1984

This was a huge achievement. Customers could now use their computers to draw charts and other graphics for reports. Based on their feedback, numerous charting and graphics features were added to Office: charting was added to Excel 2.0 for Windows in 1987, 3D charts were introduced in 1990, and the chart wizard made it even easier to create charts in 1992. As computers spread from businesses into the homes for consumer uses, GPUs became more commonplace, and memory costs dropped, these innovations became broadly available.

Over the last decade, customer needs have evolved significantly, with more emphasis on faster creation, more interactivity, support for new types of data, and broader availability. Following is a list of innovations in recent releases, described to set the context of where we are as well as where we are headed.

Faster Creation of Visualizations

Excel 2007 introduced the ability to set the style of a chart with one click and leverage richer graphics such as shadows, anti-aliased lines, and transparency. 

Office 2013 was one of our most ground-breaking releases. Quick Analysis provided immediate views of various visualization options and reduced the time to add them on your data, Chart Recommendations used intelligent heuristics to suggest charts, and Automatic Relationship Detection allowed users to more easily analyze data stored in separate tables. The charting functionality provided live preview, gorgeous styles, richer data labels, and easier ways to add chart elements, apply styles, and filter.

Quick Analysis in Excel 2013Recommended Charts in Excel 2013

Richer Interactivity

Part of my role at Microsoft involves presenting on various topics to stakeholders, and increasingly most of these include data visualizations. Only a few years back, I remember creating presentations with snapshots of charts pasted in as images, and carrying a notepad with interesting data nuggets that others might ask about. Later, as I got more “sophisticated”, the appendix of these presentations would contain numerous slides, each with an interesting snippet that someone might ask about, and I could jump to the relevant one to dig in deeper. For the very important presentations, these slides were printed out beforehand, together with printouts of the underlying data that someone could go through on the spot to answer questions that’d come up.

Data visualizations inherently invite questions. And not just the simple ones, but deep insightful ones, that go beyond making better point decisions to having a deeper understanding of how the underlying system behaves. Having an environment where we can test our hypotheses quickly utilizes the best of our creativity and learnings, making us effective participants instead of mere spectators, full on drivers instead of backseat passengers giving directions once in a while.

To enable such experiences, Excel 2010 introduced Slicers, an interactive way to filter data within Excel, and Excel 2013 introduced Timelines to make it trivial to compare data over different time period.

Slicers in Excel 2010Timeline in Excel 2013

Excel 2013 also introduced Power View, and with it brought beautiful interactivity to visualizations and more fluid exploration capabilities.

Power View in Excel 2013

With Power View, customers can create dashboards of interactive visualizations that provide instant answers to variety of questions. This capability has resonated well with our customers, one of whom mentioned the rigidity of static snapshots during meetings has been replaced by the “Power View lifestyle”, their term for the transformational way of presenting and using information.

We are very excited to have introduced Power Q&A as part of the Power BI launch. This innovative experience makes it even easier to understand your data by providing a natural language experience that interprets your question and immediately serves up the correct answer on the fly in the form of an interactive chart or graph. These visualizations change dynamically as you modify the question, creating a truly interactive experience with your data.

Power Q&A

Visualizations on All Data 

In addition, both data volumes and the types of data customers want to visualize have expanded as well.

Excel 2013 also introduced the Data Model, opening the door for workbooks that contained significantly larger datasets than before, with richer way to express business logic directly within the workbook.

Increasingly, we have access to geospatial data, and recently introduced Power Map brings new 3D visualization tool for mapping, exploring, and interacting with geographical and temporal data to Excel, enabling people to discover and share new insights such as trends, patterns, and outliers in their data over time. In addition, with Power Map, users can easily capture and distribute their insights in the form of an interactive movie, telling compelling stories about their data.

 

Power Map in Excel 2013

Visualizations Everywhere

As customers are creating insights and sharing them, we have also invested in ensuring SharePoint 2013 and Office 365 provide full fidelity rendering as the desktop client so their products remain beautiful wherever it’s consumed.

What’s Next?

The resurgence of importance of data visualization in this decade, and rise of more form factors where these will be consumed have made this an exciting field once again. Deeper interactivity that blend analysis and visualizations even more fluidly, newer types of visualizations that enable you to see deeper insights more easily, and richer experiences on the devices customers use most are just a few of the areas we’re investing in to make sure Office remains the productivity apps of choice as our customer needs evolve.

Eran Megiddo
Partner Director of PM
Microsoft Office - Analytics and Presentation Services

 Ashvini Sharma
Principal Group Program Manager 
Office Data Experiences

Wiki Life: Hayatınızı kolaylastiracak Sysinternals Tools araclari (tr-TR) - TechNet

$
0
0

Merhabalar; bugün sizlere Microsoft üzerindeki birbirinden faydalı, bir değil hatta birden çok araçtan bahsetmek istiyorum. http://technet.microsoft.com/en-us/sysinternals/bb545027

Microsoft Sysinternals firmasını satın almasının ardından buradaki faydalı araçları TechNet üzerinden paylaşıma açtığını görebiliyoruz. Belki de çok sık kullanabileceğiniz bu araçların ne işe yaradığı, nerelerde kullanılabileceği hakkında sizleri bilgilendirmek istiyorum. Her bir aracın indirilmesi ve kullanımı hakkında ürün adına tıklayabilirsiniz.

AccessChk : Dosya, Kayıt Defteri, Servislerin, İşlemlerin ve daha fazlası için izinleri görüntüler.

AccessEnum: Hangi dosyaya ya da kayıt defterine kimin eriştiği bilgisini gösteren bir araçtır.

AdExplorer: Active Directory üzerindeki bir çok objenin izinlerini görüp düzenleyebilir, ya da schema ya erişmeden bu araç üzerinden objenin, kullanıcının özelliklerini ünvanını vs. değiştirebilirsiniz.

ADInsight: Windows Authentication, Exchange, DNS yada diğer bir çok problemin giderilmesi konusunda LDAP protokolünü gözlemlemek gerekebilir, bu gibi durumlarda bu aracı kullanarak problemlerin giderilmesinda daha çabuk çözüm bulabilirsiniz.

AdRestore: Active Directory ortamında bazı objeleri ya da ayarları geri dönmeniz gerekebilir ("tombstone") . Bu gibi durumlarda size yardımcı bir araçtır.

Autologon:  Logon olduğunuz kullanıcının bilgilerini kayıt defteri üzerinde şifrelemeye yarar.

Autoruns: windows üzerinde oturum açmadan ve açtıktan sonra hangi uygulamaların çalıştığını, hangi servislerin başladığını, zamanlanmış görev olup olmadığı ve daha fazla bilgiyi görmemizi sağlar.

BGInfo: benim en sevdiğim araçlardan bir tanesidir. Bilgisayarda oturum açan kişinin bilgisayar adı, ip adresi,disk alanında ki boş yeri, işletim sistemi, rami, cpu su vs. gibi bilgileri masaüstünde gösterilmesini sağlar. Hatta bu konu hakkında yazdığım bir makaleyi de buraya eklemeden edemiyeceğim. Makaleme buradan erişebilirsiniz.

Bluescreen: Bu araç bir ekran koruyucu, c:\windows\system32 altına atıp çalıştırdığınızda ekran da sanki mavi ekran hatası varmış gibi uyarı vererek yeniden başlatıyor. Işin şakası Tabi ki başlatmıyor fakat başlatıyormuş gibi görüntü var.şakacı bir kişiliğiniz varsa arkadaşlarınıza bu araçla şaka yapabilirsiniz.

CacheSet: Mevcut ve şuanki cache belleğinizi görebileceğiniz ve bunun ayarlarını yapabileceğiniz güzel bir araç.

ClockRes: Sistem saatinin çözünürlüğü ile ilgili bir uygulama.

Contig: NTFS metadata dosyalarını birleştiren ve bunları analiz eden bir araç.

Coreinfo: Bilgisayarınız üzerindeki işlemci, cache topoloji gibi kavramları göstermektedir. Örnek olarak 4 çekirdek, 3d destekliyor vs.

Ctrl2cap: klavyeniz için sürücü içerir.

DebugView: debug yaptığınızda hataları incelemeniz için geliştirilmiş bir araç

Desktops: Bu uygulama bilgisayarınız üzerinde sanal masaüstleri oluşturmanızı sağlar. Örneğin alt+1 e bastığınızda ilk ekrandayken alt+2 ye bastığınızda başka bir ekrana geçersiniz. Toplamda 4 ekran mevcut. Denemenizi tavsiye ediyorum.

Disk2vhd: Bu araç windows üzerindeki diskinizi ya da disklerinizi sanal ortama atabilmeniz için çeviri işlemi yapar. Eğer sanallaştırma ortamınız Hyper-V ise bu araçla kendi bilgisayarınızı sanala çevirebilirsiniz.

DiskExt: Disk ve partitionların konumlandırmaya onlar üzerinde ayarlar yapmaya yarayan bir araç

DiskMon: Disk üzerindeki yapılan işlemleri monitörlemeye yarayan bir araçtır.

DiskView: Bu araç disk üzerindeki bad sektörü önlemek için geliştirilmiştir diyebiliriz. Disk üzerinde kaydolan tüm verilerin yapısını bir harita şeklinde sunan bir araçtır. Disk üzerinde zamanlı olarak disk birleştirme yapmanızı öneririm.

Disk Usage: Disk üzerindeki kullanımı raporlayabileceğiniz bir araç. Diskin boyutunu hangi al klasörün ne kadar boyuta sahip olduğu gibi bilgiler edinebilirsiniz.

EFSDump:Şifrelenmiş dosyalarınıza hangi hesapların erişebileceğini gösteren bir araçtır.

 FindLinks: uygulamaların hangi klasör üzerinden çalıştığına dair tam adresini gösteren bilgilendirme amaçlı yönetim aracıdır.

Handle: hangi program, hangi klasör açık bunun bilgisini bize sunan yönetim aracıdır.

 Hex2dec: Hexedecimal sayıları decimal e çevirebileceğiniz kullanışlı bir araç

Junction: D diskiniz üzerindeki bir klasöre sembolik olarak c:\windows\system32 miş gibi gösterebilmenize yarayan bir araç.

LDMDump: disk yapınıza ait tablo ve bölümleri listeler

ListDLLs: herhangi bir uygulamayı açtığınızda hangi dll lerin yüklendiğini görmek istiyorsanız bu aracı kullanabilirsiniz.

LiveKD: Microsoft Kernel Debugger hakkında bilgiler veriyor

LoadOrder: Hangi aygıtlara ait sürücülerin yüklendiğini gösteren bir araç

LogonSessions: kim logon olmuş, hangi authentication u kullanıyor, hangi uygulamalar çalışıyor vs. gösteren bir araç

 MoveFile ve PendMoves: geçici olarak oluşturulan klasörlerin silinmesini yada başka bir yere taşınmasına yarayan bir araç

NTFSInfo: NTFS bölümleri üzerindeki bilgileri gösteren bir araç.

PageDefrag: Pagefile, kayıt defteri gibi systemin parçalarının bakımını yapan bir araçtır.

PipeList Aygıt driverlarına ait o aygıtın kullandığı .SYS dosyalarını listeler

Portmon: seri ve parallel portların tüm aktivitelerini izlemeye yarayan bir araçtır.

ProcDump: CPU bazlı monitörlemeye yarayan bir araçtır

Process Explorer: hangi uygulamanın hangi işlemi yaptığını gösteren çok kullanışlı bir araç, sıklıkla kullanıyorum bazı zamanlar virus tespitinde bile faydalı oluyor.

Process Monitor:Çalışan uygulamanın nerede  çalıştığını gösteren bir araç

PsExec: Bu araç, network üzerindeki bilgisayarlar üzerinde program kurabilmemize yarayan araçtır.

PsFile: bu araç uzaktaki bilgisayar üzerinde hangi dosyaların açık olduğunu listelemektedir.

 PsGetSid: bu araç ile bilgisayarımızın sid kimliğini öğrenebiliyoruz. Çok kullanışlı bir araçtır.

PsInfo:İşletim sistemi versiyonu, ie vesiyonu, bilgisayar kaç gündür açık bunun bilgisini vs. öğrenebileceğiniz bir araç

 PsKill: Bilgisayarınızdaki çalışan uygulamaları sonlandırmanıza yarayan bir araçtır

 PsPing: Bantwidth ile ilgili sıkıntılarda genellikle kullandığımız uzaktaki bilgisayara paket göndererek canlı olduğunu ve bir paket bozulması vs. olup olmadığını ölçebileceğimiz bir araç

PsList: Bilgisayar üzerinde çalışan işlemler hakkında bilgiler verir

PsLoggedOn: Lokal bilgisayardaki kaynakları kim ne kadar kullanıyor bunu ölçebileceğiniz bir araçtır.

 PsLogList: Dump ve log dosya kayıtlarını listeleyebilen bir araç

 PsPasswd: Birden fazla bilgisayar üzerinde örneğin local admin lerin parolalarını değiştirebileceğiniz bir araçtır

 PsService: Windows işletim sistemi üzerindeki servislerin start/stop ve o anki durumlarını görebileceğiniz bir araçtır.

 PsShutdown: Uzaktaki ya da yerel bilgisayarınızdaki kullanıcıları log off yapabilir bilgisayarları kapatabilir ya da yeniden başlatabileceğiniz bir araçtır.

 PsSuspend: uzaktaki ya da yerel bilgisayar üzerindeki işlemleri uyku moduna çekip tekrar uyandırabilen bir araçtır.

 PsTools: PsExec, PsFile, PsGetSid, PsInfo, PsKill, PsList, PsLoggedOn, PsLogList, PsPasswd, PsPing, PsService, PsShutdown, PsSuspend bu araçların hepsini kapsayan araç.

RAMMap: Ram kullanımını gelişmiş bir yöntemle görüntülemeye yarayan bir araçtır.

 RegDelNull: Registry dosyalarını tarayarak içi boş olan kayıtları silen bir araçtır.

 Registry Usage (RU): toplam kayıt ve alt kayıtları listeleyebilen bir araçtır.

 RegJump: belirttiğiniz registry keyine (HKLM\Software\Microsoft\Windows) direk olarak giden bir araçtır.

 RootkitRevealer: Windows XP ve Windows server 2003 üzerinde gelişmiş rootkit zararlı yazılım bulmaya yarayan bir araçtır.

 SDelete: Diskiniz üzerindeki verilerin tamamiyle silinmesine yarayan bir araçtır.

 ShareEnum: Paylaşımdaki dosyaları listeleyen güzel bir araç

 ShellRunas: bilgisayarlarda çalışan programları run as administrator olarak çalıştırmaya yarayan program.

 Sigcheck: Dosya numaraları, certifika bilgileri, zaman damgaları gibi bazı bilgileri göstermeye yarayan araçtır.

 Streams: NTFS dosya sistemi için alternative veri yolları bilgisini sunar.

Strings: ANSI ve UNICODE ler için arama aracıdır.

Sync: diskler üzerindeki cach belleği temizleyen araçtır.

 TCPView: TCP ve UDP port üzerindeki gelen oturumları listeleyen bir araçtır.

 VMMap: fiziksel ve sanal ram üzerindeki kullanımı grafiksel olarak gösteren bir araçtır.

 VolumeID: Volume kimliğini değiştirebileceğiniz bir araçtır

Whois: domain adı hakkında bilgiler veren bir araçtır.

 WinObj: windows üzerindeki objelere müdahale edebileceğiniz bir araçtır.

 ZoomIt: bu araç benim video çekerken çok kullandığım bir araçtır. Belli bir Alana odaklanabilirken, dikkatleri o noktaya çekmeyi çok iyi becerebilen bir araçtır. Kesinlikle kullanmanızı tavsiye ediyorum.

 

Biliyorum biraz uzun bir yazı oldu, elimden geldiğince anlatmaya çalıştım. Bunların arasında daha önce hiç kullanmadığım araçlarda var, ama kullandıklarımda çoğunlukta. Diliyorum ki sizinde işinize yarayabilecek bir kaç araç çıkacaktır. Bu araçları topluca buradan indirebilirsiniz.

Bir başka blog yazımda görüşmek ümidiyle, şimdilik hoşçakalın.

Turkish Wiki Ninjas Davut EREN


NFL Combine Dashboard app comes to Surface for your off-season football fix

$
0
0

clip_image002

Surface, the Official Tablet of the NFL used by players, team staff and fans, isn’t resting during the off season. The first stop is the 2014 NFL Scouting Combine, where more than 300 top college players are evaluated by the NFL for the 2014 NFL Draft in May. Fans will be able to stay on top of the goings-on using an app called the NFL Combine Dashboard.

This year at the Combine, “we will help all 32 teams get player information, results and event details in near real time with the combination of Surface tablets” and the app, writes Brian Seitz, Surface senior manager. Surfaces will be used to capture data from each field event, enabling team personnel to track players as they make their way through the Combine, and make comparisons across participating players at each position.

Read more about this NFL event and Surface’s role in it at the Surface Blog.

You might also be interested in:

· Red Bull TV comes to Xbox 360, along with improved WWE app
· Get 100 GB of OneDrive storage through new Bing Rewards special offer
· Wonder what the innovators do in their off time? They tinker. In The Garage.

Suzanne Choney
Microsoft News Center Staff


Added incentive for Imagine Cup teams: Meet Bill Gates

$
0
0

Bll Gates will meet with one finalist team in this year's Imagine Cup.

On Wednesday, Microsoft announced that one finalist team in its Imagine Cup global student technology competition will be chosen for a private meeting with Bill Gates. The winning team of students will get the chance in person to share their dreams and excitement for a brighter future with Microsoft’s co-founder.

This year’s world finals are taking place in Redmond, Wash., from July 29 – Aug. 1.

For more about the competition and Gates’ participation, head over to the Imagine Cup Official Blog.

You might also be interested in:

· #ICreatedThis: Celebrating the amazing things people do with our technology
· Wonder what the innovators do in their off time? They tinker. In The Garage.
· “Dead Rising 3” new downloadable content “Chaos Rising” now ready for your zombie-killing pleasure

Steve Clarke
Microsoft News Center Staff

App of the Week: Keep up on all the big games with WatchESPN for Windows

$
0
0

Sports fans, get ready to be happy! You can now watch your favorite ESPN programming on the go on your laptops and tablets with the WatchESPN app for Windows

The free WatchESPN app lets you watch live games and studio shows with 24/7 access to ESPN, ESPN2, ESPN3, ESPNU, ESPNews and ESPN Deportes. You can also watch on-demand clips of the latest news and highlights. (Participating providers that will give you WatchESPN live video include: AT&T U-verse, Bright House Networks, Charter, Comcast XFINITY, Cox, Google Fiber, Midcontinent Communications, Optimum, Time Warner Cable and Verizon FiOS TV.)

The app offers live streaming access to thousands of games and events on the ESPN networks, including sports programming stalwarts like Monday Night Football, the NBA regular season and playoffs, Major League Baseball, professional golf’s The Masters, U.S. Open and The Open Championship, college football and basketball and all four Grand Slam tennis events. 

Download WatchESPN from the Windows Store today. 

You might also be interested in:

Jeff Meisner
Microsoft News Center Staff

PROJECT 2013 & PROJECT SERVER 2013 SERVICE PACK 1.

$
0
0

Buenas,

Ya podemos instalar el Service Pack 1 para Project 2013 y Project Server 2013. Se trata del conjunto de actualizaciones (Acumulativas y Públicas) hasta la Diciembre 2013 (Acumulativa) y Enero 2014 (Pública), además de otras mejoras de estabilidad, rendimiento y seguridad.

Varios posts oficiales pueden encontrarse en estos enlaces (en Inglés):

http://blogs.technet.com/b/office_sustained_engineering/archive/2014/02/25/announcing-the-release-of-service-pack-1-for-office-2013-and-sharepoint-2013.aspx

http://blogs.technet.com/b/projectsupport/archive/2014/02/25/project-2013-and-project-server-2013-service-pack-1.aspx

A continuación os ofrecemos los enlaces a las descargas:

CLIENTE PROJECT 2013

32 bit - http://www.microsoft.com/es-es/download/details.aspx?id=42013

64 bit - http://www.microsoft.com/es-es/download/details.aspx?id=42020

Al instalar el SP1 en el cliente, la versión será la 15.0.4569.1504. Nos hacemos eco de la recomendación de Brian acerca de no indicar esta nivel de versión para controlar los clientes que se conectan, ya que puede tener comportamientos inesperados.

PROJECT SERVER 2013

http://www.microsoft.com/es-es/download/details.aspx?id=42011

NOTA: Si modificaste el procedimiento almacenado mencionado en el artículo KB2933444, http://support.microsoft.com/kb/2933444, relacionado con la desaparición de recursos (hablamos de ello en este post: http://blogs.technet.com/b/elfarodeprojectserver/archive/2014/02/07/project-server-2013-project-online-191-que-ha-pasado-con-mis-recursos.aspx) debieras verificar que todo está como debiera (confirmemos siga bien, y si no fuera así, volvamos a realizar el cambio correcto.)

SHAREPOINT SERVER 2013

http://www.microsoft.com/es-es/download/details.aspx?id=42008

Esperamos os resulte de interés, un saludo.

Jorge Puig

Tip of the Day: Deduplication Perquisites

$
0
0

Today’s Tip…

While the deduplication feature was designed to support minimal configurations such as a single processor system with 4 GB of RAM, some additional requirements must be met…

  • WS2012 or WS2012R2 (No dedupping on Win8 client)
  • Data drives only (no system/boot volumes)
  • Locally attached storage (no mapped drives)
  • NTFS only (will not work with ReFS or any type of FAT)

A close look at a targeted attack delivery

$
0
0

For antimalware products, targeted attacks represent a very interesting class of malware. They are stealthy and only target specific organizations and industries - flying under the radar when it comes to identifying new malware files based on telemetry. The purpose of these attacks is most commonly to steal confidential and sensitive information by means of social engineering and unpatched, vulnerable software.

We recently investigated a sample used in this kind of attack, Trojan:Win32/Retefe.A, and wanted to share with you what we encountered and possible ways to avoid being infected from similar approaches.

Our analysis began when we investigated an RTF document flagged as suspicious due to its inclusion in what looked like a phishing email:

Suspicious RTF doc 

Figure 1: RTF document attached to phishing email

The email sender was spoofed by the attackers to appear as a large e-commerce company. The message is in German and is translated as “The receipt, from your Zalando Switzerland team”. Another reason for flagging the email as phishing was due to the sentence structure – it seems to be the result of an automated translation tool.

When a user attempts to open the RTF document they get the following warning from Outlook:

Outlook warning 

Figure 2: An attempt to open the RTF prompts an Outlook warning

At this point we were thinking that the RTF might contain a vulnerability that would be triggered when opening the file. However, when it was opened the document showed no indication that it contained an exploit – it just displays a small document:

small document 

Figure 3: The attachment opens a small document

Again the text is in German and translates as “To see the receipt, double click on the image”. At this point it was obvious we were dealing with a social engineering attack. The attacker is asking the victim to execute the malware willingly on their machine. Even at this point the user would see a warning message about the risks taken when executing an unknown attachment:

Warning message 

Figure 4: Security warning when attempting to open suspicious attachment

The file, which is executed if the user proceeds and clicks Open, is a Control Panel Applet (CPL). Its purpose is to establish a network connection to a malicious server and download the payload file. This particular CPL file tried to download its payload from www.ent<removed>.ch/n.exe.

At the time of our investigation the file was no longer available, but since this was not the only attempt the bad guys have made, we were able to retrieve the payload from a URL used in similar attacks: www.<removed>-club.ch/n.exe

We detect payload as Trojan:Win32/Retefe.A.

The file name of the RTF document is not consistent throughout all attacks. We have seen other names used that follow a similar pattern as those below:

  • 2379F939.rtf
  • O442Z4nV.rtf    
  • Quittung 05-02.14.rtf
  • Quittung 2014.05.02.rtf
  • uozohS+K.rtf
  • uvsWuIaY.rtf
  • vMtz+mFA.rtf
  • YdBoUSiG.rtf
  • YgRUlKut.rtf

We’ve also observed variations where the RTF document was replaced by a .DOC file following the same infection strategy. The file names used are similar, for example:

  • Quittung 2014.05.02.doc
  • Quittung 05-02.14.doc
  • unnamed.doc

The document can also be embeded in an archive from which the user needs to extract the .RTF or .DOC file. Example file names include:

  • A1 Rechnung #13784126 von 05-02-2014.zip
  • A1 Rechnung #746537 von 050214.zip
  • Ihre Bestellung #83919469  vom 03022014.zip
  • Ihre Bestellung  N9397351  vom 0402-14.zip

Trojan:Win32/Retefe.A also displays a window where it informs the user that they need to install an “update” and advises them to click “Yes” when the UAC window is displayed. This is another layer of social engineering to trick the user and avoid making them suspicious. The message even shows which button to press in the UAC, and can appear in English or German depending on the computer locale.

English 

Figure 5: Further social engineering from Trojan:Win32/Retefe.A advises the user to run the malware

Engineering script 

Figure 6: The strings encountered in the binary of the social engineering message

As shown above, threats such as Trojan:Win32/Retefe.A use multiple techniques to encourage users to run the malicious file. The user also receives numerous warning about the danger of proceeding. Despite these warning we still have reports of this threat running on machines - primarily in German speaking countries. Running an up-to-date, real-time security product, such as Microsoft Security Essentials, can help protect your PC from this type of malicious threat. However, the best form of defence is to avoid these malicious files from running in the first place. The easiest way to do this is to educate users on the risk of opening unsolicited email attaments and recognising a phising email.

Reference files:

Downloaded file:

  • SHA1: 0e832c750e445484494923ce5e2e385cc73a4df1
  • MD5: aa19c341970a39bac50eabf634b6262d
  • Detected : Trojan:Win32/Retefe.A

CPL file:

  • SHA1: 3b86362334fce7e339f2fd36901eb30043b9481d
  • MD5: 26e2ef85182c0e14a90e1108ab6f644f
  • (Detected : TrojanDownloader:Win32/Retefe.A


MMPC Munich

Success at the Sochi Winter Games!

$
0
0

Now that the Sochi Winter games have closed, it’s interesting to note how Microsoft was involved behind the scenes. 

More than 2.1 million people tuned in to watch NBC Sports Digital’s record-setting stream of Team USA versus Canada in the semifinal hockey game, powered by Windows Azure. During the 18 days of one of the biggest sporting events in the world Windows Azure provided information on the Games to more than 100 million fans and guests through sochi2014.com and delivered more than 6,000 hours of high-definition streaming from Windows Azure Media Services, to 5 broadcasters across 22 countries in 4 continents. This included 204 live streaming channels, more than 100 TB of storage and around 500 billion storage transactions. None of this would have been feasible without a globally distributed public cloud platform like Windows Azure.

Fans using Windows Phone devices were also able to get instant information on the Winter Games through two mobile apps: Sochi 2014 Guide and Sochi 2014 Results. These apps made the Top 20 free applications at the Windows Phone Store in Russia, with more than 1 million people installing them.

Microsoft technologies, including Dynamics and SharePoint, powered the infrastructure, systems, information management and communications for the games. In fact you could say that Microsoft Dynamics won an honorary gold medal from the International Olympic Committee. The “Dynamics for Olympics” system managed 800,000 units of equipment, 36,000 square meters of warehouse space, 1,200,000 litters of diesel fuel, and 18,500 truck deliveries in the last 3 months.

Microsoft Enterprise Services drove the entire project serving as a trusted technology advisor to the Olympic Committee, and had a team of 23 people standing by to assist 24/7 on site.

Last but not least, the Microsoft Technology Hall in the Olympic Park featured a wide array of the latest Windows 8.1 devices for anyone to try. Guests also explored events automated through Microsoft Dynamics solutions that provided simple and clear examples of how complicated business solutions work. Around 100,000 people visited Microsoft hall during the Games.

App-V 5.0 Capacity Planning Article Now Published

$
0
0

Info around how to plan out and size App-V 5.0 Server Infrastructure has been a hot ask, we recently published an article on TechNet which gives some brilliant guidelines around capacity planning and it can be found here.


Deploying System Center Endpoint Protection to Mac OS X using Configuration Manager

$
0
0

Overview:

In this post, I’m going to talk about the process I took to package and deploy the Mac Endpoint Protection client using Configuration Manager 2012 SP1.

My Environment:

  • CM12PS1.CONTOSO.LOCAL = Standalone Primary Site Server (HTTPS Only)
  • Justins-MacBook-Pro.local = Mac OS X Client not domain joined

Steps to Take:

The first thing you will need to do is download the latest Endpoint Protection clients for Mac and Linux. This is available from the Volume Licensing website. This should either be an ISO or a self-extracting .EXE.

Once the files are extracted, you should put it on a network share that a Mac OS X client can access, because we will need to create a Configuration Manager application (.CMMAC file) using the CMAppUtil tool from the Mac OS X client installer(In the tools folder).

I’m actually using the RTM bits for Endpoint Protection, because I didn’t have access to the SP1 bits. I copied the Endpoint Protection Installer (ENU.scepMac.i386.dmg in my case) and the CMAppUtil tool to the desktop on my Mac.

Next you will need to open terminal cd to the location of the CMAppUtil and the DMG installer then run some commands to create a CMAPP installer file (My command was "sudo ./CMAppUtil -c ./ENU.scepMac.i386.dmg -o ./" yours may be different depending on your DMG Installer name)

There will be two packages within the DMG image. You will be prompted to choose what one you want to create a CMAPP file for. We want to choose option 1 (this should be the install.pkg)

Type 1 and click enter, it should begin the process of creating the CMMAC file. This file will be saved in the current path you are in within terminal.

Now we will need to copy our CMMAC file to our package source share so we can create an application within the Configuration Manager console

Now we will create an Application in the Console for the CMMAC file for Endpoint Protection

Once the Application is created, I distributed Content and created a required Deployment for the end point protection applicationto a collection containing my Mac Client. This is the notification that the end user should receive when the machine refreshes its policy.

Install Complete!

Here’s the Client

Disclaimer: The information on this site is provided "AS IS" with no warranties, confers no rights, and is not supported by the authors or Microsoft Corporation. Use of any included script samples are subject to the terms specified in the Terms of Use

Using RBA To Separate Servers And Workstations In Configuration Manager 2012

$
0
0
Overview:

A question I see come up a lot is how can I Delegate permissions for my Server Team to only see/manage servers and my Desktop Team to only see/manage desktops in Configuration Manager?

In Configuration Manager 2007, the best option was to have two completely different Configuration Managers sites(One site for servers and one for desktops).

In this Post/Guide, I'm going to walk through the process  of using Role-Based Administration in Configuration Manager 2012 to achieve this in a Single Primary Site.

My Environment:
  • CMServerAdmin = Domain account that will be to demonstrate a Server administrator.
  • CMDesktopAdmin = Domain account that will be to demonstrate a desktop/workstation administrator.
  • AD Global Security Group named CM Server Admins CMServerAdmin is part of this group
  • AD Global Security Group named CM Desktop Admins CMDesktopAdmin is part of this group
  • Standalone Primary Site = PRI
How It Works:

The first step you will need to do is create two collections one for Servers and one for Desktops/Workstations. If you wanted to delegate permissions to computers by location(e.g. United States & Canada) you would simply create a collection of machines based on location (This can be used for more than just separating Server & Desktops).

Image 018

I'm going to start by creating my Desktop Collection. If you wanted to delegate permissions based on something other than Servers/Workstations name your collection accordingly.I'm going to name this collection All Desktops.

Image 019

You will need to create a Query to find all Desktops/Workstations. I used a Query to find where Security Role = "WorkStation". See an example below:

Image 020

Since this collections is going to be used as our limiting collection for all other Workstation/Server collections, it would make sense to use "Incremental Updates" for this collection.

Image 021

You will want to repeat this process to create a collection for Servers. Obviously, we will want to change the Collection Name and the Query. In the Query, use where security role = "Server".

You should see your All Desktops and All Servers collection now.In my environment, I have 3 Desktops and 1 Server.

Image 023

Next we will add two new "Administrative Groups" to our site:

Image 024

I will start by adding my CM Desktop Admins group. You will need to add a Security Role for your group (I used Full Administrator but any will work). You will also need to change the Collection this group can manage. Since this in the Desktop Admin group, I assigned the All Desktops Collection.

Image 025

Repeat this process for the CM Servers Admins group make sure you change the collection they can manage to your "All Servers" collection.

Here's a Screenshot of both of my New Administrative Groups:

Image 027

Now that we have our groups setup so they can only see the collection assigned to them. We should be able to check out the console for each of these users.

The Screenshot below is how the devices node will look when CMDesktopAdmin(Or any user part of CM Desktop Admins Group) is logged in. You can see that the only devices this user can see is devices in the "All Desktops" collection.

Image 029

Here is what the Collection Node will look like as CMDesktopAdmin:

Image 030

Here is how things will look logged in as CMServerAdmin:

Image 031

Here is how the Collection Node will look:

Image 032

Wrapping Up:

This post showed you how you can use the new Role-Based Administrative model in Configuration Manager 2012 to allow certain Users/Groups to only be able to manage certain resources.

Limiting certain users/groups to certain collections with RBA can help with the following (To name a few):

  • Ensure that CM administrative users can only see Resources they need to
  • Ensure that CM administrative users can only create collections that are limited to the collection they are able to manage
  • Ensure that CM administrative users can only create deployments to Resources they are approved to manage

Hope this helps!

Disclaimer: The information on this site is provided "AS IS" with no warranties, confers no rights, and is not supported by the authors or Microsoft Corporation. Use of any included script samples are subject to the terms specified in the Terms of Use

Minimum Permissions Needed To Perform Client Push In Configuration Manager 2012

$
0
0
Overview:

A question that seems to come up in the forums a lot is "What Permissions Are Required To Allow An User To Push The Configuration Manager Client?".

In this post, I'm going to walk through the process of delegating the minimal permissions needed to perform "Client Push" on a resource in Configuration Manager 2012. I'm also going to show how you can use RBA Viewer.

Things to know before starting:

Permissions will be delegated using Role-Based Administration (Security Role).

We will being using the default "Remote Tools Operator"Security Role as our template to create a custom Security Role for client push purposes. This is because this Security Role has the closest permissions needed for client push.

The following Permissions are needed to perform a Client Push Installation:

  • Collection
    • Read
    • Modify Resource
  • Site
    • Read

How To Do It:

If you haven't used RBA Viewer it is part of the Configuration Manager SP1 Toolkit, I would highly recommend trying it out. RBA Viewer essentially allows you to emulate the built in "Security Roles" and select custom Permissions and see what actions console will appear to the user who has those permissions.

I used RBA Viewer and determined that the"Remote Tools Operator" security role had the closest permissions needed to perform client push so we will use this Security Role as a template for our custom role for Client Push. Below is a screen shot of the permissions for the "Remote Tools Operator" Security Role.

Image 011

The "Remote Tools Operator" has the following permissions setup by default:

  • Collection
    • Read
    • Remote Control
    • Read Resource
    • Control ATM

In RBA Viewer I removed Remote Control, Read Resource, and Control ATM.

I added the "Modify Resource" permissions and clicked Analyse. You will now see that Install Client is now availablein RBA Viewer.

Image 012

Alright, So we determined the minimum permissions required to perform "Client Push". We will now need to create the "Custom Security Role"for Client Push.

We will need to create a Copy of the "Remote Tools Operator"Security Role. The Copy option just allows you to create a new Security Role using the permissions from the Security Role that you Copied from.

Image 013

After you click Copy the"Copy Security Wizard"will open, Delegate the permissions mentioned above and remove the "Remote Tools" specific permissions.

Image 014

The Read permission on Site is needed to select the Site drop down when performing "Client Push".

Image 015

So now that we have our custom Security Group for Client Push. I added a new Administrative user (CONTOSO\CMPush) and granted the "Client Push" Security Role to that user.

Image 016

Here's what what the console will look like logged in as CONTOSO\CMPush when the user is only a part of the "Client Push" Security Role.

Image 017

Hope this helps!

Disclaimer: The information on this site is provided "AS IS" with no warranties, confers no rights, and is not supported by the authors or Microsoft Corporation. Use of any included script samples are subject to the terms specified in the Terms of Use

Lise Charmel choisit la Business Intelligence de Microsoft pour des analyses précises et un meilleur pilotage de son activité.

$
0
0

" Dans un contexte économique tel que nous le connaissons actuellement, il est primordial d’avoir une réelle connaissance de nos marchés et de leurs comportements en terme de produit : comment avoir le bon produit, au bon moment pour un secteur donné. La solution Business Intelligence de Microsoft nous le permet. » - Delphine Boulange, DSI Lise Charmel

Retrouvez le témoignage ici : http://www.microsoft.com/France/references/fiche-temoignage.…

Reminder: Tomorrow is the last day to sign up for the VAR Rebate!!

$
0
0

8662_2350_WoodyWalton_SMB_PTA_1ACBB3E7_thumb_21C5197C

Woody Walton

Microsoft’s VAR incentive program is a MUST DO for any reseller out there that sells Microsoft products and solutions.  All you have to do is be a registered member of the Microsoft Partner Network (free), and sign up for the incentive program (also free)!

After that we track your Open License sales through distribution and you receive a check!  The program runs in 1/2 year increments.  This one from January 1st, 2014-June 30, 2014.  Upon signing up, we cover you retroactively back to January 1.

The beauty of the VAR Incentive program is that you can receive rebates in excess of 22 percent, for some Microsoft Products.  Examples that may interest you are that all of our Microsoft Office 365 SKUs through Open license offer an 8% rebate!  This part month that has been bumped an additional 25% to 33% for sales in February.  You may be too late to capitalize on this most recent kicker, but be sure not to miss additional opportunities through June 30!

Make sure you are rewarded for what you sell.  If you are not, you are leaving money on the table.

You can find out more and sign up for the Microsoft VAR Incentive program at the below links:

US VAR Incentive Program Landing Page

registration form on the OneView site

FY14 H2 US Partner Incentive Program – Value Added Resellers (terms and conditions)

Act Today!!!!

Woody

Viewing all 17778 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>