Controlling Network Traffic Distribution with Microsoft Azure Traffic Manager

Controlling Network Traffic Distribution with Microsoft Azure Traffic Manager
I love Azure! There are so many great features included with the service it’s amazing. One of them I discovered recently is the Azure Traffic Manager. It provides intelligent and granular network traffic distribution using DNS. Essentially it is a cloud-based virtual Global Server Load Balancing (GSLB) solution. Easy to take advantage of and works for on-premises workloads too! Read my latest article on to learn more.

TechMentor 2015 DirectAccess Deep Dive Training Session

I’m excited to announce that I’ll once again be participating in this year’s TechMentor conference in Redmond, WA! The event takes place August 3-7, 2015 and will be held on the Microsoft campus in building 33. This is a great event at an incredible venue! I’ll be delivering a 3 hour Windows Server 2012 R2 DirectAccess deep drive technical training session on Thursday, August 6. The conference covers a wide range of topics from many noted industry experts like Don Jones, Greg Shields, Jeff Hicks, Orin Thomas, and many more. Don’t miss out. Register today and use priority code TMRSK05 to save $500!

TechMentor Conference 2015 Monthly Newsletter – December 2014

The monthly newsletter is out! In this month’s edition I take a look back at security happenings in 2014. It certainly was an interesting year! Microsoft finally ended support for Windows XP, there were serious security vulnerabilities in open source platforms announced, and data breaches galore. Never a dull moment! As always, news and current events are covered too. Check it out! Monthly Newsletter – November 2014

The monthly newsletter is out! In this month’s edition I provide highlights about the recently released Microsoft Security Intelligence Report (SIR) volume 17. The SIR is always interesting and important for security administrators across all vertical as it provides valuable information regarding the current threat landscape and successful attacks by cybercriminals. Do yourself a favor and read the newsletter, then download and read the report. This is something you don’t want to miss.

Reserved IP Address Options in Microsoft Azure

I’ve been working with Microsoft Azure a lot lately, utilizing their Infrastructure-as-a-Service (IaaS) virtual machines to extend my on-premises test lab and for a few other projects I’m working on too. Address assignment in Azure is dynamic, with services typically being accessed by hostname. There are times when having a static IP address is desirable, however. Microsoft Azure does have several options available to address this need. Read my latest article on to learn more.

Creating Custom Base Images in Microsoft Azure

Configuring Unstructured File Storage in Microsoft Azure

There are a number of storage options available in Microsoft Azure, including blobs, tables, and queues. There are also various versions of SQL available in both Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). Recently Microsoft announced the availability of Azure Files, which is designed for unstructured data that can be access via SMB. This is a wonderful new feature that will greatly enhance the IaaS solution, as having a native Azure storage option for things like scripts, configuration files, and software that can be access via file share in the cloud will streamline things greatly. No more having to configure a dedicated file server VM! For more information about Azure Files, read my latest article on here.

Creating Custom Base Images in Microsoft Azure

Deconstructing Forefront TMG 2010 Firewall Client Operation and Communication

The Firewall Client, an optional client-side component that can be deployed with Forefront TMG 2010, is arguably the most powerful tool a security administrator can use to control network traffic destined for the public Internet in their organization. The Firewall Client provides seamless and transparent proxy services for all Winsock TCP and UDP communication. More importantly, all Firewall Client communication is authenticated, allowing TMG administrators to enforce strong user and group based access control on traffic using the Firewall Client. In this month’s article on I provide detailed information about how the Firewall Client works. I also break down how communication takes place at the network level, providing deep insight as to how the Firewall Client communicates with the TMG firewall.

Microsoft Forefront TMG 2010