Tags » System Center

Hyper-V Security book

A fellow MVP Andy Syrewicze and Eric Siron wrote a Hyper-V Security book. the book is a guide on how to defend your virtual environment from attack. 46 more words


Learn from my Mistakes – SCCM 2012: Importing Computers and Limiting Collections

This is probably one of those “Duh” moments that we all have but I thought I’d share it anyway.

I was getting frustrated when I was importing the MAC address of a new, out of the box computer into SCCM 2012 to be used to test my latest development build.   318 more words


B2T vs. B2D - Why Tape Backups Should be Excommunicated

It’s 2015, but some people are still using tapes for backup purposes. Let’s just say there is a plethora of better ways. Tape technologies are old and proprietary. 456 more words

System Center

Orchestrator Standard Logging Real Time Web Display

Orchestrator is a great tool for workflow and automation, but out of the box, it severely lacks any sort of centralized logging. Sure you can write out events to event logs and collect them with SCOM, but that can be problematic. 183 more words

System Center

Ad-Hoc NTFS Permission report using Orchestrator & Powershell

I had a client recently that had an archaic VB Script to generate a report of “Who Has Access” to particular folders withing a corporate directory. 596 more words

System Center

Failure to backup system state with DPM 2012 R

Failure to backup system state with DPM

Recently I have been handed the backup responsibilities for our servers.  To do this I have been implementing DPM 2010.   233 more words