Quantcast
Channel: TechNet Blogs
Viewing all 17778 articles
Browse latest View live

Life in the digital crosshairs: Experience the untold story

$
0
0

On Saturday, July 13, 2001, Microsoft was alerted to a nasty piece of malware called “Code Red.” In just two weeks, ABC News reported that the Code Red worm had infected more than 300,000 Windows computers around the world. When the news broke, it was like something straight out of a Tom Clancy novel. Microsoft learned early on that if it was going to succeed at building trust with its customers, it could not make security an afterthought when developing its products and services.

So how do you get a large organization like Microsoft to prioritize security with thousands of developers, writing millions of lines of code? How do you get everyone marching toward the same goal?

Some folks here recently spent time with a few of the people behind the scenes in security at Microsoft to discuss their journey and how they helped to fundamentally shift the culture within Microsoft.

Now you can get the never-before told inside story on Microsoft Security.

You might also be interested in:

· Be a game developer using Project Spark, now in global beta for Xbox One
· Find what you need on Superpages, now on Windows Phone
· Watch music videos using Xbox One’s Xbox Music

Jeff Meisner
Microsoft News Center Staff


Working with Data Models created using SQL Server 2008 R2 PowerPivot for Office Excel 2010 in Power BI

$
0
0

Guest Post by Kay Unkroth

 

Power BI supports PowerPivot data models of any version. Users can choose between SQL Server 2008 R2 and SQL Server 2012 PowerPivot for Excel 2010 or simply use the latest PowerPivot version directly integrated with Excel 2013. The newest version includes more features than its predecessors, offers significant improvements to the user interface, and provides the best and most seamless user experience in Power BI. For these reasons, we strongly recommend that Power BI user take advantage of the capabilities provided through Excel 2013 and upgrade their existing data models. Upgrading a data model is as easy as opening an existing workbook in Excel, then clicking Manage on the PowerPivot ribbon, and approving the upgrade notification. For step-by-step instructions, see Upgrade Power Pivot Data Models to Excel 2013 at http://office.microsoft.com/en-us/excel-help/upgrade-power-pivot-data-models-to-excel-2013-HA103356104.aspx.

Users who opt to stay with a previous PowerPivot version must accept that certain functionality is not available, such as Power View reports directly embedded into a workbook. Most importantly, if you are using the SQL Server 2008 R2 PowerPivot add-in, you should upgrade at least to the SQL Server 2012 version and upgrade your workbooks. The free SQL Server 2012 SP1 PowerPivot add-in is available for download at http://www.microsoft.com/en-us/download/details.aspx?id=29074.

If you do not upgrade your SQL Server 2008 R2 PowerPivot workbooks prior to uploading them to Power BI, you might notice that you cannot open these workbooks in the browser. The workbook initially opens, but when you interact with the data, such as by clicking on a slicer, an error message might be displayed stating that “An error occurred while working on the Data Model in the workbook.” This is due to an issue in Power BI preventing the system to load older data models. The following screenshot shows the error message.

image

While this issue will be fixed soon, note that essential features, such as external data refresh, will not be available for these older workbooks in any case. For refresh to work in Power BI, the workbook must be upgraded to at least the 2012 PowerPivot version. The following screenshot shows the notification a user receives when attempting to refresh a SQL Server 2008 R2 PowerPivot workbook.

image

So don’t wait for these issues to slow you down! Upgrade your workbooks prior to uploading the files to Power BI sites. For best results and maximum functionality in Power BI, upgrade your workbooks to the 2013 version of Excel and PowerPivot. Then upload your files to Power BI in order to share your work effortlessly, and fully enjoy a seamless user experience with all BI capabilities. Remember, working with Data Models created using SQL Server 2008 R2 PowerPivot in Power BI is not a recommended best practice.

PowerShell connectivity to Azure, Exchange Online and Exchange on-premises all-in-one

$
0
0

I use the following function in my PowerShell profile so that I can use the Microsoft Online cmdlets, the Exchange cmdlets against Exchange online and the Exchange cmdlets against on-premises all in one session...

 

Firstly - If you are unsure how to create your PowerShell profile, you can do the following (from a PowerShell session) :

Test-Path$profile

If the results are FALSE, then you need to create your profile :

New-item–typefile–force$profile

To modify your existing profile, or edit it after you've created it :

ii$profile

Now on to the function (paste this into your $profile) :

 

if (!(get-moduleMSONLINE)) {import-moduleMSONLINE}

FunctionConnect-Office365

{

[CmdletBinding()]

param

(

[Parameter(Mandatory =$False)]

[System.Management.Automation.PsCredential]$Credential=$Host.UI.PromptForCredential("Enter MSOL Admin Credential",

"Enter the username and password of an MSOnline Administrator account.","","userCreds"),

[Parameter(Mandatory =$False)]

[System.Uri]$Uri="https://ps.outlook.com/powershell/"

)

connect-msolservice-credential$credential

$session=New-PSSession-ConfigurationNameMicrosoft.Exchange-ConnectionUri$Uri-Credential$Credential-Authentication"Basic"-AllowRedirection

Import-PSSession$session-prefixEXO-AllowClobber

Return$session

}

It's important to note that if you run this on a system that doesn't have the Exchange Management Shell (i.e. Your Exchange Server) or the Exchange ps-snapin loaded, you will only have Azure and Exchange Online in your session.   Making this function part of your profile on an Exchange server will allow you to have all 3 (or loading the Exchange ps-snapin on your system).

 

It's also important to note that I use the -prefixEXO switch for the ps-session command, so that all the Exchange Online cmdlets (e.g. get-mailbox) will need to be prefixed with EXO (e.g. get-EXOmailbox) while the on-premises Exchange cmdlets (e.g. get-mailbox) will stay the same.

 

Lastly, if you find that you need to use a proxy server, you can add the following line before the $session=New-PSSession line :

$proxysettings=New-PSSessionOption-ProxyAccessTypeIEConfig

And add the following to the end of the $session=New-PSSession line :

-SessionOption$proxysettings

 

To use this new function, just launch PowerShell and type Connect-Office365, you will be prompted for your tenant credentials and will be connected to Azure and Exchange Online.

 

Wiki Life: A Picture is Worth a 1000 Words

$
0
0

There is a saying, "A picture is worth a 1000 words". I'm sure you've heard the idea behind this saying. A picture (of something you’re trying to describe) helps people understand (or visualise) what you’re attempting to communicate far better than a "1000 descriptive words could".

It’s no secret that pictures are very effective at helping communicate ideas and concepts. Take time to create and format the images you intend to use to achieve maximum impact! Here are some tips!

  1. Use clear (good quality) images
  2. Use an editor to add lines, arrows, etc. for indicating highlights. This makes your images look clearer and more professional. It adds credibility to your article.
  3. Format (compress) your images if you can (think of faster download times) (see the links to good free image editors below)
  4. If you can, save your image "for the wiki". If your source image has a width over 600px, save it with a maximum width of 600px (the maximum width supported by the wiki page format)
  5. You can use Microsoft Word's drawing canvas and tools to create an image. Then snip it with the Snipping Tool (Windows 7/8 users)
  6. Use the snipping tool to take screen shots (Windows 7/8 users)
  7. Only snip the area of screen that is relevant to your article. This makes sure what you are trying to communicate with the image is clear.
  8. Remember, images are not deleted from the Wiki once they've been uploaded – so be careful about what you upload
  9. If your image contains sensitive information, then use an image editor to "mask" that part of the image.
    Tips for scrubbing/masking: use a blur filter, a thick line, or a rectangular box (filled-in). This will keep your image looking neat.
  10. Always set the maximum width property to the actual width of the source image (if the image is 600px or less).
  11. Use a width property that is less than or equal to the width of your source image (browsers generally do a bad job of enlarging an image)
  12. Use pictures wisely. Not everything needs a picture. For example, "Step 6: Click Ok to close the properties dialog window", would not need an image of the dialog box with the "OK" button circled. Most people are familiar with using the Ok button to close a dialog box; it doesn't need illustrating!
  13. Have fun! You can use your images to add clever content to your article – just make sure it’s appropriate. E.g. if your image is of a user properties form, you can give the user an unusual name, department name, office, location, etc.

Free Image Tools and Utilities

  1. Sniping Tool (Windows 7/8 users)
  2. Pixlr (http://pixlr.com/editor/)
  3. Gimp (http://www.gimp.org/)

Resources

  1. Wiki: Basic Image Formatting using Pixlr (http://social.technet.microsoft.com/wiki/contents/articles/23364.wiki-basic-image-formatting-using-pixlr.aspx)
  2. Wiki Article: Insert an image into an article (http://social.technet.microsoft.com/wiki/contents/articles/264.wiki-how-to-add-a-video-or-image-to-your-article.aspx)
  3. Wiki Article: Maximum widths for wiki images (http://social.technet.microsoft.com/wiki/contents/articles/145.wiki-how-to-contribute-content-to-technet-wiki.aspx#Images)
  4. Point 4, in the content section: (http://social.technet.microsoft.com/wiki/contents/articles/145.wiki-how-to-contribute-content-to-technet-wiki.aspx#Content)


Other Posts in this series:

Sefnit’s Tor botnet C&C details

$
0
0

​We have talked about the impact that resulted from the Sefnit botnet Tor hazard as well as the clean-up effort that went into that threat. In this post we’d like to introduce some of the details regarding the Tor component’s configuration and its communication with the Tor service. Specifically, we’ll talk about how Trojan:Win32/Sefnit.AT communicates with the Tor network, what domains it tries to contact, and where it keeps its configuration data.

After Sefnit installs the Tor-based malware component, which is typically named wins.exe, a copy of a non-malicious Tor client is also installed and added as a Windows service. This service is started every time Windows starts and is configured to accept connections on TCP ports 9051 and 9050. However, since these ports are bound to the loopback interface, which is not remotely accessible, no additional threats are added to the infected PC.

Tor service interaction

The TCP port 9051 is the control port for the legitimate local Tor service and is used to control most of the aspects of a Tor client. So far, however, we have only observed this port being used by malware to obtain status information regarding the connection to the Tor network. This is accomplished by periodically requesting status updates using the control protocol.

empty authentication request 

Figure 1: Malware sends an empty authentication request

From this example we can see that Win32/Sefnit.AT sends an empty authentication request and receives a successful response (250), which means that all authentication methods for the installed Tor client are disabled. Since the TCP port is not accessible remotely, the lack of authentication poses no threat to the victim’s PC. Additionally, the malware requests the current state of a Tor circuit, which in this case is established, meaning the Tor client is connected to the anonymizing network.

The TCP port 9050 is used as a communication point for the SOCKS proxy, which allows any application that can be configured to use a proxy server to communicate over Tor. The malware uses this method to contact its command and control (C&C) web servers. This bypasses the traditional network infrastructure since traffic over the Tor network is encrypted, which also prevents network-based IDS from detecting the malware. The C&C endpoints utilize the Tor hidden service which allows using the anonymizing network to host web servers without compromising the location and identity of the server owners.

In order to contact a web server that uses the Tor hidden service feature the network uses a special domain naming scheme. The server’s name is derived from its public key within the Tor network appended with .onion as the top level domain as opposed to .com or .net. The malware contains a list of .onion domains that are contacted using the standard HTTP protocol (over SOCKS):

  • 6tlpoektcb3gudt3.onion
  • 7fyipi6vxyhpeouy.onion
  • 7sc6xyn3rrxtknu6.onion
  • ijqqxydixp4qbzce.onion
  • l77ukkijtdca2tsy.onion
  • lorpzyxqxscsmscx.onion
  • lqqciuwa5yzxewc3.onion
  • lqqth7gagyod22sc.onion
  • mdyxc4g64gi6fk7b.onion
  • onhiimfoqy4acjv4.onion
  • pomyeasfnmtn544p.onion
  • qxc7mc24mj7m4e2o.onion
  • wsytsa2omakx655w.onion
  • ye63peqbnm6vctar.onion

Sefnit attempts to create a proxy connection 

Figure 2: Sefnit attempts to create a proxy connection

From this example we can see the malware attempts to create a proxy connection to the lqqciuwa5yzxewc3.onion domain and succeeds. Next, data is submitted to the /cache directory on that server, which replies with a successful status code (200).

Malware configuration details

The list of CnC servers is stored inside a unique file and folder combination that at first glance appears to be randomly generated, although they have not changed much over time. Specifically, the malware creates a directory with the name 049e7fb749be2cdf169e28bb0a27254f and inside places two files using the name 181084e525a65ef540c63d60ce07f836 with two different extensions of .ct and .ph.

During closer examination we identified that the apparently random directory is actually created by using the MD4 cryptographic hash function to compute a digest of a Unicode string ps. The resulting binary digest is converted into a hex representation and used as the directory name.

binary digest calculation 

Figure 3: Calculation of the binary digest

To generate the file names the same cryptographic function is used but this time to compute the digest of a Unicode GUID string {b3717590-6447-47db-abca-a304803890cb}, which after hex conversion results in 181084e525a65ef540c63d60ce07f836.

The PH file (181084e525a65ef540c63d60ce07f836.ph) may potentially serve as a botnet identifier since the data inside remains fairly static. In fact, it is the AES-256 encrypted version of the same GUID string with encryption key #?oUs?ai??+yIIZ?S?dcvDzI XOewA2. This key is hard-coded in the malware binary.

The encryption key is hard coded 


Figure 4: The encryption key is hard coded in the malware binary

The CT file (181084e525a65ef540c63d60ce07f836.ct) contains the actual configuration data that is also encrypted using the AES-256 algorithm together with the same encryption key. The decrypted data is a serialized object, which appears to have been created using the Boost C++ library, and contains the following information:

  • The victim’s public IP address    
  • A string resembling an ID (for example, Verna) which is taken from the XOR obfuscated data inside the malware
  • List of C&C domains    
  • Current working directory of the malware

decrypted data 

Figure 5: The decrypted data is a serialized object

Such configuration files are detected as Trojan:Win32/Sefnit!cfg.

In conclusion we have couple of interesting observations. First, the cryptographic code is compiled into the malware, as opposed to being dynamically loaded from an external DLL. Specifically, the code is based on the OpenSSL library version 1.0.0d released in February 2011. Additionally, the C&C server responses, if we are to trust the response headers, indicate that some web servers use an old version 1.1.19 of Nginx, which is also from 2011. Lastly, you can use Microsoft Security Essentials and Windows Defender to detect and remove both the Sefnit malware and the configuration files.

Dmitriy Pletnev

MMPC

Constraints: what they are and how they’re used

$
0
0

Hey everyone this is Wes Hammond from Premier Field Engineering and I wanted to share with you some info that I have gathered about setting up constraints.

What are Constraints?

Constraints are used to restrict certificate authorities that you DO NOT TRUST that are part of your chain.  They come in the form of rules placed on the certificate authority that permit or restrict the certificates issued by the CA based on the criteria provided in the request.

Where to apply Constraints?

This is a great question.  While Constraints can be defined at any level of a PKI, it’s recommended that they be applied at a subordinate (hopefully a Policy CA) and not a Root CA.  Setting this in subordinate CA allows the PKI to maintain flexibility.   If set at the Root CA, this would require a redeployment of the hierarchy in the event a change in the constraint or policy is desired.

Basic Constraints

Basic Constraints limit the path length for a certificate chain.  This type of constraint limits the number of CAs that exist below the CA (depth) where the constraint is defined.  See the diagram below.

 

Specifying a basic constraint of 1 at the policy CA ensures that the maximum path length for certificates that chain to the Policy CA is 1 level deep.  If a subordinate certificate is requested from one of the issuing CA’s, the request will fail.

Applying Basic Constraints

Basic Constraints can be applied with 2 different methods.

CAPolicy.inf

Applying Basic Constraints in the CAPolicy.inf allows the CA Manager to specify the constraint during installation or renewal from the CA where the constraint is being set.

Sample:

[Version]

Signature= "$Windows NT$"

 

[BasicConstraintsExtension]

PathLength=1

Critical=Yes

 

Policy.inf

The administrator of a parent CA can set basic constraints on a subordinate by applying a policy to the request delivered from the subordinate before it is issued.  The syntax is the same as that in the CAPolicy.inf.

Examples:

Here is an example of a request containing Basic Constraints

Naming Constraints

Naming constraints ensure that a certificate request presented to the Certificate Authority must conform to set of naming rules.  All name forms included in the request must be in the permitted namespace and must not be in the excluded namespace.  See the diagram below:



Types of Naming Constraints

 

Relative distinguished name

DIRECTORYNAME = “DC=contoso, DC=com”

DNS domain name

DNS = .contoso.com

Universal Resource Identifiers (URI)

URL = http://.contoso.com

E-mail name and User principal name (UPN)

Email = .contoso.com
UPN = .contoso.com

IP address

IP Address constraints limit the IP or IP ranges that can successfully receive certificates.  The IP(s) must include both the IP address and the subnet mask.

More examples of name constraint and their syntax can be found here:
http://technet.microsoft.com/en-us/library/cc737026(v=WS.10).aspx

Applying Naming Constraints

CAPolicy.inf

Applying Name Constraints in the CAPolicy.inf allows the CA Manager to specify the constraint during installation or renewal from the CA where the constraint is being set by using the [extensions] syntax.  Below is an example that contains both permitted and excluded Name Constraints.

Sample:

[Version]

Signature= "$Windows NT$"

 

[Strings]

szOID_NAME_CONSTRAINTS = "2.5.29.30"

 

[Extensions]

Critical = %szOID_NAME_CONSTRAINTS%

%szOID_NAME_CONSTRAINTS% = "{text}"

_continue_ = "SubTree=Include&"

_continue_ = "UPN = .contoso.com&"

_continue_ = "email = .contoso.com&"

_continue_ = "DNS = .contoso.com&"

_continue_ = "DIRECTORYNAME = DC=corp, DC=contoso, DC=com"&"

_continue_ = "URL = .contoso.com&"

 

_continue_ = "SubTree=Exclude&"

_continue_ = "UPN = east.corp.contoso.com&"

_continue_ = "email = .east.corp.contoso.com&"

_continue_ = "DNS = .east.corp.contoso.com&"

_continue_ = "DIRECTORYNAME = DC=east, DC=corp, DC=contoso, DC=com&"

_continue_ = "URL = .east.corp.contoso.com&"

 

Policy.inf

The administrator of a parent CA can set Name Constraints on a subordinate by applying a policy to the request delivered from the subordinate before it is issued.  The syntax is the same as that in the CAPolicy.inf.  However, an alternative syntax is also supportedsuch as that seen below.

[Version]

Signature= "$Windows NT$"

 

[NameConstraintsExtension]

Include = NameConstraintsPermitted

Exclude = NameConstraintsExcluded

Critical = True

 

[NameConstraintsPermitted]

DNS = .contoso.com

email = .contoso.com

UPN = .contoso.com

DIRECTORYNAME = "DC=corp, DC=contoso, DC=com"

URL = .contoso.com

 

[NameConstraintsExcluded]

DNS = .east.corp.contoso.com

email = .east.corp.contoso.com

UPN = east.corp.contoso.com

URL = .east.corp.contoso.com

DIRECTORYNAME = "DC=east, DC=corp, DC=contoso, DC=com"

 

Examples:

Here is an example of a request that contains Name Constraints.

Application Policy

 

A typical subordinate CA can issue an end entity certificate for “ANY” purpose.  Applying Application Policy allows restriction on the Enhanced Key Usage for certificates issued by a subordinate.  See the diagram below:

Applying Application Policy

CApolicy.inf

Applying Application Policy in the CAPolicy.inf allows the CA Manager to specify the constraint during installation or renewal from the CA where the constraint is being set.

Sample:

[Version]

Signature= "$Windows NT$"

 

[ApplicationPolicyStatementExtension]

Policies = AppEmailPolicy, AppCodeSignPolicy, AppClAuthPolicy, AppSeAuthPolicy

CRITICAL = FALSE

 

[AppEmailPolicy]

OID = 1.3.6.1.5.5.7.3.4 ; Secure Email

[AppCodeSignPolicy]

OID = 1.3.6.1.5.5.7.3.3 ; Code Signing

[AppClAuthPolicy]

OID = 1.3.6.1.5.5.7.3.2 ; Client Authentication

[AppSeAuthPolicy]

OID = 1.3.6.1.5.5.7.3.1 ; Server Authentication


Policy.inf

The administrator of a parent CA can set the Application Policy on a subordinate by applying a policy to the request delivered from the subordinate before it is issued.  The syntax is the same as that in the CAPolicy.inf

Examples:

Here is an example of a request that contains Enhanced Key Usage and/or Application Policy. 

Applying Policy.inf to a request


If you would like to apply a policy.inf to a request use the command line below:

Certreq -policy originalrequest.req policy.inf modifiedrequest.req

originalrequest.req– the original request file provided by the subordinate to the parent CA
policy.inf - The policy file containing the settings you want to be applied to the request
modifiedrequest.inf - This is the output file that will contain the original request and has been modified by the policy.  This file will be supplied to the parent CA instead of the originalrequest.req

ZooTracer: Tracking animals and other objects made easy through video

$
0
0

Get Microsoft Silverlight

A collaboration between the Computational Ecology and Environmental Sciences (CEES) group at Microsoft Research Cambridge introduced ZooTracer at the end of February as a downloadable, easy to use desktop tool that could dramatically expand the amount and kind of data gathered from the natural world.

ZooTracer can be used to track animal movement using consumer video equipment. Video can be taken from anywhere and users can easily modify results. Inside Microsoft Research explains that the software can provide accurate tracking of multiple, unmarked, interacting animals. It can also adjust to variations in lighting, camera movement and object appearance — regardless of the type of recording device or habitat.

“Most other video-tracking software packages require the user to have thought quite hard about what they were going to do before they did it,” says Lucas Joppa, a scientist in the CEES group who heads the Conservation Science Research Unit, which focuses on science, policy and tools and technology. “For example, using extreme background subtraction algorithms allows for a heavily automated object detection and tracking process. But the actual collection of video footage appropriate for such algorithms can become a trying affair — and it certainly doesn’t work for most field biologists!”

Find out more about ZooTracer on Inside Microsoft Research.

You might also be interested in:

Athima Chansanchai
Microsoft News Center Staff

Tips on starting a Skype call using keyboard shortcuts

$
0
0

clip_image002

When you’re switching between instant messaging and calling friends, starting a call in Skype for Windows Desktop is easier if you can use keyboard shortcuts.

In a post on Skype’s Tips & Tricks blog, Matthew de Beer reveals pressing Ctrl+R to start an audio call or Ctrl+Shift+R to start a video call. Learn more about using hotkeys in Skype for Windows desktop. You can also start a call by typing /golive in the message box of a group chat, press Enter and it will start a call with that group.

The blog post also gives a tip on how to merge two calls into one group call when the second person calls you: Choose “Add to group call” on the incoming call box.

Find more tips on Skype calling on the Tips & Tricks blog.

You might also be interested in:

Athima Chansanchai
Microsoft News Center Staff


The key to a secure cyberspace: Speed and resilience

$
0
0

Posted by Mark Williams
Chief Security Officer, Microsoft Federal

Organizations of all types today face a daily and growing assault from nation states, lone actors and organized crime. The effects of a cyber-attack can be as far-reaching, troublesome and significant as physical attacks, and can make or break organizations that are not sufficiently prepared. The question is, how can an organization embed cyber security into its suite of core business functions?

Tom Ridge, the first secretary of the U.S. Department of Homeland Security and one of the world’s most prominent security experts, shared his assessment of the current cyber security landscape at this week’s 2014 Microsoft Federal Executive Forum, an annual event hosted by Microsoft for its federal government community customers.

[Read more...]

...(read more)

Az új akciófilm: 200

$
0
0

Február hónap masszív mennyiségű újdonságot hozott az Azure életében. Mind a fejlesztőknek, mind az infrastruktúrért hódolóknak megremeg a keze ez a feature lista láttán. Szemezgetni a teljesség igénye nélkül innen (is) lehet: http://weblogs.asp.net/scottgu/archive/2014/02/20/azure-expressroute-dedicated-networking-web-site-backup-restore-mobile-services-net-support-hadoop-2-2-and-more.aspx

Hadd emeljek ki a tömegből 2 újdonságot:

1, Az egy előfizetéshez adható co-adminok (elérhetik és konfigurálhatják az Azure erőforrásokat) száma korábban 10 -ben volt maximálizálva. Egy nagyvállalatnál, ahol sok szervezeti egységben dolgoznak a kollégák (bázis infra, hálózat, alkalmazás üzemeltetés, biztonság stb.), és pl.: szabadságolás miatt nem árt ha egy szervezeti egységből több embernek is van hozzáférése ez a 10 -es limit kevés lehetett. Most meg lett emelve. Nem 20 és nem 300, hanem 200! "This is AZUUURRREEE" ;-)

2, A virtuális gépek részére csak dinamikusan, DHCP segítségével lehetett belső hálózati IP címeket kiosztani. A Windows Azure Powershell 0.7.3.1 verziója óta lehet használni a Set-AzureStaticVNetIP parancsot – amit ahogy a neve is mutatja – fix IP cím beállítására tudtok használni.

Attila

SMA Capabilities in Depth: Assets

$
0
0
Posted on behalf of Ravi Kiran Chintalapudi, Senior Program Manager, Automation & Integration In this blog, I will discuss why Automation Assets are available in Service Management Automation (SMA) and how they add value to Windows PowerShell. . For details on how to create and use assets in SMA, please see http://technet.microsoft.com/en-us/library/dn457809.aspx This blog will cover the following topics: A. What are Automation assets? B. Why we created Automation assets C. Benefits on top of...(read more)

Watch your favorite SyFy, USA and Telemundo shows on your Windows device

$
0
0

Screenshot_4975_1000004

NBC Universal delivers some of its best television programming right to your Windows PC or tablet with a trio of free apps now available in the Windows Store.

USA Now brings everything from “Modern Family” and “Suits” to “Psych” and “CSI” – along with a handy program guide and easy searching. Spanish favorite Telemundo Nowbrings the best of this popular network right to you, from telenovellas like “La Promesa” and “Avenida Brasil” to shows like “Top Chef Estrellas” and “La Voz Kids.”

And Syfy Nowoffers shows from “Scare Tactics” and “Naked Vegas” to “Being Human” and “Face Off.” Everyone can enjoy a limited selection of fresh content for free, or just login with your TV subscription credentials for unlimited access.

Get all three from the Windows Store today!

You might also be interested in:

· Tips on starting a Skype call using keyboard shortcuts
· ZooTracer: Tracking animals and other objects made easy through video
· App of the Week: Be part of every pass, shot and tackle in “FIFA 14” for Windows Phone

Jeff Meisner
Microsoft News Center Staff

Get hands-on with Windows 8.1: New virtual labs

$
0
0

TechNet Virtual Labs just released two new virtual labs to help you get more hands-on with Windows 8.1: Introduction to Windows 8.1 and Access and Information Protection. Read about them below and get started today with this simple, fast way to experience Windows 8.1.

 

TechNet Virtual Lab: Introducing Windows 8.1 UI features for businesses

In this module you’ll see how to enable features such as boot to desktop, which might be more appropriate for users who prefer or need to use keyboard and mouse. You’ll also learn about continuous, variable snap views that let you multi-task with modern and desktop apps on all kinds of devices. You’ll also learn about tools that Internet Explorer has to offer.

 

TechNet Virtual Lab: Access and Information Protection

The demonstrations in this session focus on how the Windows 8.1 operating system has evolved from the Windows 8 and Windows 7 operating systems as well as the new Windows 8.1 user interface (UI) elements. The demonstrations in this session include booting directly to the Windows 8.1 desktop, how to use the new Snap feature, and Internet Explorer 11.

 

After you immerse yourself in these new Windows 8.1 virtual labs, be sure to also check out the other 500+ free hands-on labs and guided experiences available from TechNet Virtual Labs- including the new Windows Server 2012 R2 Evaluation using TechNet Virtual Labs, available from the "select a version" dropdown on the Windows Server 2012 R2 evaluation download page; and the new guided experiences for Lync Server 2013, SharePoint Online 2013, andExchange Server 2013.

Join Microsoft at this year’s South by Southwest (SXSW) tech, music and film festival

$
0
0

clip_image002

Microsoft’s headed to Austin for the annual South by Southwest gathering in Austin, and this year the company is an official sponsor of the event, which combines tech, music and film into one entertaining and educational festival and conference.

Several events will be held at the Microsoft Studio, 323 Congress Ave. in Austin, to showcase the company's innovations in music, gaming, travel, photography and social media from Windows, Xbox, Surface, Windows Phone, Microsoft Research and more.

Microsoft is also hosting a special performance by DJ, music journalist and record producer Questlove, probably best known as the drummer and joint front man for The Roots. He will perform on his Windows PC at the Microsoft Studio on Saturday, March 8.

You can RSVP, or if events are full up, be added to a wait list here. On Twitter, follow #ReadyWhenYouAre and #MicrosoftStudio for updates on everything happening at the Microsoft Studio during SXSW, as well as @Windows, @WindowsPhone and @Microsoft leading up to and during SXSW for a chance to win prizes and giveaways. And, learn more about Microsoft at SXSW here.

You might also be interested in:

· Find out how to make the most of Bing for Schools, including getting free Surface RT tablets
· Microsoft Research Data Science Summer School now accepting applications
· Three new social experiences can help companies work more like a network

Suzanne Choney
Microsoft News Center Staff

Part 1 of 3: Social Media and Nonprofits - Interview with Heather Mansfield

$
0
0

Microsoft Corporate Citizenship caught up with Heather Mansfield, Principal Blogger of Nonprofit Tech For Good in Melbourne, Australia to get her perspectives on social media and advice for nonprofits in Asia Pacific. 

As part of its Technology for Good programming in Asia Pacific, Microsoft hosts social media workshops for the nonprofit sector.  To read about past events, see the event summaries on Storify here.  To find out more about Microsoft's resources for the nonprofit sector and upcoming events in your country, subscribe to the Tech4Good e-newsletter.

Stay tuned for the next two parts in this three-part interview series with Heather Mansfield and visit the Nonprofit Tech for Good blog for valuable resources about nonprofits and social media.   


Studie: Microsoft-Anwendungen weniger leicht angreifbar als Software anderer Hersteller

$
0
0

Der dänische IT-Sicherheitsanbieter Secunia, bekannt durch die wirklich nützliche Anwendung Secunia PSI, hat die 50 beliebtesten Anwendungen auf ihre Angreifbarkeit untersucht. Dabei wurden die Programme in drei Kategorien unterteilt:

  1. Microsoft-Software: Sie machen gut ein Drittel (34 Prozent) der Top-50-Programme auf Computern aus, auf denen der “Personal Software Inspektor” (PSI) von Secunia installiert ist.
  2. Programme von Drittanbietern: Sie machen zwei Drittel der Top-50-Software aus (66 Prozent).
  3. Betriebssysteme: Secunia untersuchte hier die Angreifbarkeit des meist verbreiteten Betriebssystems Windows 7.

Über den Untersuchungszeitraum von fünf Jahren betrug der Anteil der Schwachstellen in Drittanbieter-Software rund 75 Prozent.

Microsoft-Software, inklusive Windows 7, machen zwar zwei Drittel der Top-50-Programme aus (66 Prozent), sind aber nur für 24 Prozent der  Angriffsmöglichkeiten verantwortlich. Nur acht Prozent der Angriffsmöglichkeiten entfallen dabei auf Windows 7, 16 Prozent auf andere Microsoft-Programme.

Im Jahr 2012 fanden sich 86 Prozent der Schwachstellen in Programmen von Drittanbietern, 5,5 Prozent in den Betriebssystemen und 8,5 Prozent in Microsoft-Programmen.

Den ausführlichen Sicherheits-Report für 2014 hat Secunia hier veröffentlicht.

PS: Aktuelle Sicherheitsmeldungen über Angriffe aus dem Netz und Sicherheitslücken in Software erhalten Nutzer jetzt auch per Web- und Mobile-App: Die SecurityNewsApp ist kostenlos für Windows 8, im Apple App Store und bei Google Play erhältlich. Durch die Auswahl von Kategorien (Windows, Linux, Mac und Mobile) bekommt der Nutzer nur die Meldungen, die für ihn relevant sind.

Gastbeitrag von Michael Kranawetter, Chief Security Advisor (CSA) bei Microsoft in Deutschland. In seinem eigenen Blog veröffentlicht Michael alles Wissenswerte rund um Schwachstellen in Microsoft-Produkten und die veröffentlichten Softwareupdates.

 

SCOM SQL 2008 Dashboard

$
0
0

Hello,

After some of my customers loaded the latest MP for SQL on SCOM 2012, they noticed the great dashboard for SQL 2012 databases.  This was a fantastic view as the visual impact and amount of data presented was great.  The big compliant that each one had was exactly the same!  Why do I not have this for my 2008 Databases? 

So I figured I would give it a try to rip apart the 2012 presentation MP and modify it for the 2008 world of SQL databases  :)

Here is the 2012 Dashboard:

Now with a bit of modification I was able to pull off the below:

Please feel free to let me know if you see anything that needs to be updated or changed.

Disclaimer:

This example is provided “AS IS” with no warranty expressed or implied. Run at your own risk. The opinions and views expressed in this blog are those of the author and do not necessarily state or reflect those of Microsoft.

**Always test in your lab first**  Do this at your own risk!! The author will not be held responsible for any damage you incur when making these changes!

Windows XP : Notification de la fin du support

$
0
0

Le support de Windows XP prend fin le 8 Avril 2014. A partir de cette date Windows XP ne sera plus supporté et aucune mise à jour de sécurité ne sera publiée.

Nous vous recommandons de migrer dès que possible vers Windows 7 ou Windows 8.1.

Voici un tutoriel si vous souhaitez savoir comment migrer de Windows XP/Vista vers Windows 8.1

 

Afin de sensibiliser les utilisateurs, une notification de la fin de support sera affichée une fois par mois à partir du 8 Mars à 15h00.

clip_image001

Cette notification est apportée par l’installation d’une mise à jour publiée par Windows Update depuis le 5 Mars 2014.

Numéro de mise a jour : KB2934207

clip_image003

Cette mise à jour créé 2 tâches planifiées :

· Une pour s'exécuter à l'ouverture de session (à partir du 8 Mars)

· Une pour s'exécuter le 8 de chaque mois à 15h00 (à partir du 8 Mars)

clip_image005

Cette mise à jour n'est pas disponible dans le catalogue Windows Update. Elle n'apparaîtra donc pas sur vos serveurs WSUS, SCCM et Intune.

Si votre entreprise met à jour automatiquement Windows à partir de Windows Update vous pouvez désactiver la notification par clé de registre :

o HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DisableEOSNotification

ou

o HKCU\Software\Microsoft\Windows\CurrentVersion\DisableEOSNotification

  • Type : REG_DWORD
  • Pour activer la notification mettre la valeur à : 0
  • Pour désactiver la notification mettre la valeur à : 1

Ismaël et Alexandre

PowerTip: Stop a PowerShell Job

$
0
0

Summary: Learn how to stop an unwanted Windows PowerShell job.

Hey, Scripting Guy! Question How can I stop an over-running Windows PowerShell job?

Hey, Scripting Guy! Answer Even though this is not something you’d normally do, creating an infinite loop is a common (and
          potentially, very embarrassing) error. This job will run forever:

Start-Job -ScriptBlock {while ($true){sleep -Seconds 10}}

When you realize that your job is over-running, use the Stop-Job cmdlet:

Stop-Job -Id 14

You can then hide the evidence by using Remove-Job to delete the job.
You can test the data in the stopped job with Receive-Job, if desired, before you delete the job.

Úvod do sideloadingu Windows 8 aplikací pomocí SC Configuration Manageru

$
0
0
Autorem tohoto článků je Martin Booth, Senior Technical Product Manager v produktovém týmu System Center. Protože jde o téma značně zajímavé a rezonující s informacemi, které přinášíme na českém TechNet blogu, přinášíme vám článek v českém překladu. Originál článku v anglickém jazyce naleznete na blogu Jeffa Bullera . V článku si popíšeme...(read more)
Viewing all 17778 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>