Second Shot Tests are Back For Microsoft !

Second Shot provides you with a free retake on your exam should you need it – at no additional cost to you. To qualify as free, the retake must be the same exam as the one you didn’t pass. Plus, either exam can be taken in a testing center or through Online Proctoring (OP), offering you greater exam taking flexibility. Find out if OP is available in your country.

To qualify for Second Shot,

  • Schedule and take an MCP exam between July 12, 2015, and January 12, 2016. Simply go to https://www.microsoft.com/learning, log in, and schedule your exam.

  • After your exam, log in to check your personal dashboard at https://www.microsoft.com/learning to verify testing results. Please allow up to 24 hours for results to show up on the dashboard.

  • Register for your retake within 30 days of the date from the failed exam date.

  • Review the Pearson VUE testing center availability for your specific exam and then schedule your retake.

  • For complete terms and conditions of this offer, visit the Second Shot page on our website.

For More Info go here

 

Microsoft Virtual Academy Classes

Here are a few classes that you might want attend.

What’s New in Windows Server 2016 Preview Jump Start

Would you like to get your IT department out of the business of managing routine, manual, error-prone tasks so you can finally focus on higher value improvement and deployment activities that delight your enterprise users? Join us for a demo-packed look at Windows Server 2016 Preview, and see why it is the platform of choice for the integrated datacenter.
A team of experts walks you through a host of new automation features and support for partner technologies and your open source solution investments. In these two half-day sessions, explore enhanced virtualization functionality, together with automated processes and configuration to help you spin up compute, storage, and networking resources faster. Preview new features that reduce system downtime, find out how rolling upgrades can help you adopt updates and operating systems faster for Hyper-V and Scale-Out File Server, and take a look at new storage replication technology. Plus, check out the zero-footprint, cloud-optimized Nano Server technology, along with scripting with the new PowerShell Desired State Configuration features. Build on your Windows Server knowledge, and find out what’s new in Windows Server 2016 Preview!

Course Outline:

  • Introducing Windows Server 2016 Preview
  • Server Virtualization in Windows Server 2016 Preview
  • Introducing Nano Server
  • Introducing Windows and Hyper-V Containers
  • Software-Defined Storage in Windows Server 2016 Preview
  • Software-Defined Networking in Windows Server 2016 Preview
  • Automation in Windows Server 2016 Preview

Register Here

Preparing Your Enterprise for Windows 10 as a Service

What do you need to begin testing Windows 10 for your organization? Find out, in the fifth episode of the Enterprise Mobility Core Skills series. Learn about and see some of the features that make Windows 10 useful to your users and a powerful technical platform for IT Pros.
Gain core skills around new infrastructure components to take advantage of everything in Windows 10. Find out how Windows will evolve through servicing, and learn how you can make the most of servicing to get new features to your users faster.

Register Here

 

Getting Started with Windows 10 for IT Professionals

Here is a online course you can take about windows 10

Register Here

 

PowerShell IP Commands

Here is a second in a series of articles on using PowerShell I would suggest for the beginner use PowerShell ISE this will help you with the commands. We cover IP configuration in this article.

Some Commands that you can use in PowerShell are;

Get-NetAdapter

Restart-NetAdapter

Get-NetIPInterface

Get-NetIPAddress

Get-NetRoute

Get-NetConnectionProfile

Get-DNSClientCache

Get-DNSClientServerAddress

Register-DnsClient

Set-DnsClient

Set-DnsClientGlobalSetting

Set-DnsClientServerAddress

Set‑NetIPAddress

Set‑NetIPv4Protocol

Set‑NetIPInterface

Test-Connection

Test-NetConnection

Resolve-Dnsname

By knowing this we can use this to do IPv4 Troubleshooting Process, we could use the old command line tools, but with PowerShell we can save results and pipe some commands. For example;

Step

Windows PowerShell

Command-line tool

Verify the network configuration is correct

Get-NetIPAddress

ipconfig

Identify the network path between hosts

Test-NetConnection -TraceRoute

tracert

See if the remote host responds

Test-NetConnection

ping

Test the service on a remote host

Test-NetConnection -Port

Telnet

See if the default gateway responds

Test-NetConnection

ping

 

Technorati Tags:

PowerShell for Security and Auditors

Here is a start of a series of articles on using PowerShell I would suggest for the beginner use PowerShell ISE this will help you with the commands.

Here are some cmdlets that Manage User Accounts

Cmdlet

Description

New-ADUser

Creates user accounts

Set-ADUser

Modifies properties of user accounts

Remove-ADUser

Deletes user accounts

Set-ADAccountPassword

Resets the password of a user account

Set-ADAccountExpiration

Modifies the expiration date of a user account

Unlock-ADAccount

Unlocks a user account after it has become locked after too many incorrect login attempts

Enable-ADAccount

Enables a user account

Disable-ADAccount

Disables a user account

Here are some cmdlets that Manage Groups

Cmdlet

Description

New-ADGroup

Creates new groups

Set-ADGroup

Modifies properties of groups

Get-ADGroup

Displays properties of groups

Remove-ADGroup

Deletes groups

Add-ADGroupMember

Adds members to groups

Get-ADGroupMember

Displays membership of groups

Remove-ADGroupMember

Removes members from groups

Add-ADPrincipalGroupMembership

Adds group membership to objects

Get-ADPrincipalGroupMembership

Displays group membership of objects

Remove-ADPrincipalGroupMembership

Removes group membership from an object

Here are some cmdlets that Manage Computer Accounts

Cmdlet

Description

New-ADComputer

Creates new computer accounts

Set-ADComputer

Modifies properties of computer accounts

Get-ADComputer

Displays properties of computer accounts

Remove-ADComputer

Deletes computer accounts

Test-ComputerSecureChannel

Verifies or repairs the trust relationship between a computer and the domain

Reset

-ComputerMachinePassword

Resets the password for a computer account

Here are some cmdlets that Manage OUs

Cmdlet

Description

New-ADOrganizationalUnit

Creates OUs

Set-ADOrganizationalUnit

Modifies properties of OUs

Get-ADOrganizationalUnit

Views properties of OUs

Remove-ADOrganizationalUnit

Deletes OUs

 

So now that we have basic commands look what we can do just using the Get-ADuser PowerShell command.

Show all the properties for a user account:

Get-ADUser –Name “Administrator” -Properties

Show all the user accounts in the Sales OU and all its sub containers in the foo.com domain

Get-ADUser –Filter * -SearchBase “ou=Sales,dc=foo, dc=com” -SearchScope subtree

Show all of the user accounts with a last logon date older than a specific date:

Get-ADUser -Filter {lastlogondate -lt “January 1, 2015”}

Show all of the user accounts in the Sales department that have a last logon date older than a specific date:

Get-ADUser -Filter {(lastlogondate -lt “January 1, 2015”) -and (department -eq “Sales”)}

Now let’s get Wild…… Let show how to make this really easy to use by the use of Pipes.

Use the pipe character ( | ) to pass a list of objects to a cmdlet for further processing (think about the results of 1 cmdlet being used by the next.

So this script will look for users who have not login since January 1, 2015 and the use that to then disable those accounts….

Get‑ADUser ‑Filter {lastlogondate ‑lt “January 1, 2012”} | Disable‑ADAccount

I could have saved the first part of the command to a text file called users.txt and then ran

Get-Content C:users.txt | Disable-ADAccount

 

Windows 10 Coming

Here are some resources for you to get up to speed.. July 29 is the day .

These are Video from the Ignite conference ..

Overview of Windows 10 for Enterprises – Jim Alkove

Secure Authentication with Windows Hello – Nelly Porter

A New Era of Threat Resistance for the Windows 10 Platform – Chris Hallum

The New User Experience with Windows 10 – Chaitanya Sareen

What’s New in Windows 10 Management and the Windows Store – Michael Niehaus

Windows 10 Mobile Device Management (MDM) in Depth – Janani Vasudevan

Top Features of Windows 10 – Simon May

Provisioning Windows 10 Devices with New Tools – Vladimir Holostov

Windows as a Service: What Does It Mean for Your Business? – Michael Beck

Windows 10: Ask the Experts – Mark Minasi & Experts

 

 

Technorati Tags:

Microsoft Security Intelligence Report

The latest volume of the Microsoft Security Intelligence Report is now available. This volume of the report focuses on the threat landscape in the second half of 2014 when there were some dramatic changes.

The vulnerability disclosure data published in the report suggests that there was a 56.3% increase in vulnerability disclosures between the third and fourth quarters of 2014. After many periods of relatively small changes in disclosure totals, the 4,512 vulnerabilities disclosed during the second half of 2014 is the largest number of vulnerabilities disclosed in any half-year period since the CVE system was launched in 1999. Disclosures of vulnerabilities in applications other than web browsers and operating system applications increased 98.3% in the second half of 2014 and accounted for 76.5% of total disclosures for the period.

Figure 1. Industry wide vulnerability disclosures between the first half of 2012 (1H12) and the second half of 2014 (2H14)

Figure 2. Industry wide operating system, browser, and application vulnerabilities between the first half of 2012 (1H12) and the second half of 2014 (2H14)
Overall, encounters with Java exploits continued to decrease significantly in the second half of 2014, while Flash Player exploit attempts increased.

Figure 3. Trends for the top Java exploits detected and blocked by Microsoft real-time antimalware products in 2014

Figure 4. Adobe Flash Player exploits detected and blocked by Microsoft real-time antimalware products in 2014
Regional threat assessments are available for over 100 countries as well as an online tool that enables you to quickly compare two locations.

Figure 5. Infection and Encounter Rate Trends tool available at www.microsoft.com/security/sir/threat

 

This post is a copy of the Microsoft June 2015’s Security Newsletter and is copied here to share info with you….

This Document is a must read for Any Security or IT professional