WSUS Automated Maintenance: Decline and remove updates and optimize database and IIS

WSUS Automated Maintenance: Decline and remove updates and optimize database and IIS https://ift.tt/3tuUFCZ In most environments, the crucial task of distributing updates for Windows, Office, and other Microsoft products is handled by Windows Server Updates Services (WSUS). However, they still lack the ability to automate essential maintenance tasks. WSUS Automated Maintenance solves this issue. Wolfgang […]

Remediation Steps for the Microsoft Exchange Server Vulnerabilities

Remediation Steps for the Microsoft Exchange Server Vulnerabilities https://ift.tt/2POZ6Kr This post is also available in: 日本語 (Japanese) Background On March 2, the security community became aware of four critical zero-day Microsoft Exchange Server vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065). These vulnerabilities let adversaries access Exchange Servers and potentially gain long-term access to victims’ environments. While […]

Get started with ARM templates

Get started with ARM templates https://ift.tt/3eGYYH8 This week, a video was released that I recorded with April Edwards for Microsoft’s Channel 9! In this video, which is part of the Azure Enablement show, we talk about how you can get started with ARM templates. In this post, I want to show you a little further […]

Microsoft provides workaround for Windows 10 patchday printer issue (BSOD)

Microsoft provides workaround for Windows 10 patchday printer issue (BSOD) https://ift.tt/38FBNZU [German]Microsoft confirmed last Friday (US time) the BSOD issues triggered with the March 2021 patchday in Windows that systems with certain printers crash via BlueScreen, with more details, and a workaround was suggested. Printer crash via BlueScreen With the March 9, 2021 security updates, […]

Docker Security Cheat Sheet

Docker Security Cheat Sheet https://ift.tt/2tgi15r Docker Security Cheat Sheet Introduction Docker is the most popular containerization technology. Upon proper use, it can increase the level of security (in comparison to running applications directly on the host). On the other hand, some misconfigurations can lead to downgrade the level of security or even introduce new vulnerabilities. […]