Posted by Mikhail Rodionov on June 21, 2018
SQL Server Always Encrypted feature explained

In this blog post, I will do the general overview of this feature and additionally highlight things important to know for prospective 70-473 exam takers. Always Encrypted feature protects your sensitive data enabling separation between data owners which supposed to be able to view the data and data managers who should not have access to it (despite having a very high level of permissions which is necessary and sufficient to manage your data). With this feature in place, high-privileged SQL users or cloud database operators cannot access your encrypted data. This feature ensures encryption of data at rest and in use.

Learn More

Posted by Florent Appointaire on June 19, 2018
[Azure] Deploy a Service Catalog for your different teams in your company

Some month ago, Microsoft released a new Azure feature allowing to deploy service catalogs right in the public cloud. What is that thing for? To make teamwork in Azure a breath! Now, thanks to prebuilt templates and controlled parameters, your teams can deploy web apps or VMs so that they won’t break your budget (if you set everything right, of course). Learn how to deploy service catalogs in Azure in the full article by Florent Appointaire.

Learn More

Posted by Florent Appointaire on June 14, 2018
[Flow] Discovering and start using Microsoft Flow

Microsoft Flow is a handy tool to create automated workflows between your favorite apps and services. It allows you to collect data, sync files, and automate all that boring jobs related to, let’s say, sending emails once a tweet with a buzzword is posted. Find out how to set Microsoft Flow in the full article by Florent Appointaire.

Learn More

Posted by Boris Yurchenko on June 12, 2018
Basic Hyper-V virtual NIC management

Let’s be honest, any system administrator may face the need of hot-adding the network interfaces to the guest VMs in his Microsoft Hyper-V environment one day. And that’s no problem as Windows Server 2016 brought in a whole set of useful features, one of which is the ability to add and remove network adapters on the running VMs. Moreover, you can do that in two ways – GUI, if you’re looking for a straightforward process and PowerShell if you are a fan of automation.

Learn More

Posted by Dmytro Malynka on June 5, 2018
Forget about disasters sabotaging your IT environment thanks to stretched clustering

These days, businesses do not stick to one location anymore. Such trend pushes companies to build stretched clusters, IT infrastructures spanned across several locations. Such approach enables them to implement better disaster recovery strategies and achieve higher performance. To build such environments, you need fast connection and the solution to use resources of all your remote sites just as they were located in one place. Here, StarWind Virtual SAN comes into play – the solution for building high performing active-active replicated shared storage.

Learn More

Posted by Sergey Sanduliak on May 30, 2018
Take your backup infrastructure security and cost efficiency to the next level with StarWind VTL for Backblaze and Veeam

I would like to introduce you a complex solution that combines backup storage pool, backup software, and ability to offload the backup data to the fast cloud storage. All this functionality works in unison, creating an easy-to-manage and reliable environment for your backups.

Learn More

Posted by Vitalii Feshchenko on May 24, 2018
How to Perform Check Disk on Cluster Shared Volume on StarWind VSAN

Sometimes, you can see an error in Failover Cluster Manager as “Chkdsk scan needed on volume”. It might happen due to some potential problems on a disk. To fix the issue, the system advices you to run a Chkdsk which is the well-known command for every system administrator.

Learn More

Posted by Gary Williams on May 22, 2018
Install Gitlab, HTTPS and the container registry

Many of us view Gitlab as something that only developers may use. Indeed, these guys love it, but are they the only ones who may find it handy? That’s time to dispel that myth! Gitlab is more than the cool repository for scripts of any size and shape. It is a feature-rich solution, so that won’t be fair to leave that thing on the table.

Learn More

Posted by Romain Serre on May 17, 2018
Chain Veeam Backup job to reduce backup window

We all know what backup window really is, right? It’s an extremely short period of time that you are supposed to fit all your backup processes in somehow. Still, this challenge looks not that hard to accomplish as long as you are using that time wisely. That’s, actually, what Veeam Backup & Replication backup job chaining is intended for!

Learn More

Posted by Vladan Seget on May 15, 2018
How to protect users against Malicious Websites using CryptoMiners via Windows Defender Application Guard

Fairly often, unexperienced end users get caught on some website which uses malware or newly some crypto miners which uses up to 70% of your PCs power to mine a cryptocurrency for some hackers. So how to protect at best those end users? One of the new ways is to use Microsoft’s built-in utility called Windows Defender Application Guard (WDAG).The tool is designed for W10 Enterprise version only and the system has to support to run Hyper-V role. Microsoft introduced a new layer of defense-in-depth protection which uses Hyper-V for isolation purposes.

Learn More