Wednesday, 9 August 2017

Microsoft Office offline Installation of office 365 users


Download Office 365 2016 packages using Office Deployment Tool:
Link to download Office deployment tool.exe for Office2016 only:- http://www.microsoft.com/en-us/download/details.aspx?id=49117

Friday, 14 July 2017

BMW and Microsoft work to create an even more productive ride with Skype for Business in new BMW 5 series






image: https://mscorpmedia.azureedge.net/mscorpmedia/2017/07/Skype-for-Business-car.jpg

By Ulrich Homann, Distinguished Architect, Cloud + Enterprise
In today’s always-on culture, people need to be productive from anywhere – including their cars. Commute times are reaching record highs and people work from a variety of locations. This means that people need a way to capitalize on time spent in their cars. At Microsoft, we believe that cars should be more than just a ride, and also be a personal office on wheels, helping people be productive and giving them time back to enjoy their lives. Our partners at BMW share that philosophy and have positioned the company for a future where the nature of work is more mobile.
In 2016, Microsoft and BMW announced a partnership to build a platform called Open Mobility, which powers BMW Connected, BMW’s personalized mobility companion powered by the Microsoft Azure cloud. BMW and Microsoft took another step to help its drivers be even more efficient on the go. Following the launch of the new BMW 5 series in December 2016, BMW became one of the first auto manufacturers to commercially offer Office 365 communications and collaboration services through Microsoft Exchange to drivers who already rely on Office 365 at work and want to extend the services to their car.

Sunday, 9 July 2017

Petya ransomware prevention & detection in Azure Security Center

This blog post was authored by Tim Burrell, Principal Engineering Manager, Microsoft Threat Intelligence Center .
Microsoft Malware Protection Center (MMPC) published a blog post yesterday detailing a new ransomware infection that appears to have begun in Ukraine and spread from there to other places in Europe and beyond. MMPC analysis showed this to be a more sophisticated variant of Ransom:Win32/Petya and all free Microsoft antimalware products were updated with signatures for this threat, including Windows Defender Antivirus.
This post summarizes measures that Azure customers can take to prevent and detect this threat through Azure Security Center. See here for basic information on enabling Azure Security Center.

Prevention

Azure Security Center scans virtual machines across an Azure subscription and makes a recommendation to deploy endpoint protection where an existing solution is not detected. This recommendation can be accessed via the Prevention section as shown below.
Security Center - Overview
Drilling into the Compute pane (or the overview recommendations pane) shows more detail, including the Endpoint Protection installation recommendation being discussed here:
Compute
Clicking on this leads to a dialog allowing selection of and installation of an endpoint protection solutions, including Microsoft’s own antimalware solution:
Install Endpoint Protection
Select Endpoint Protection
These recommendations and associated mitigation steps are available to Azure Security Center Free tier customers.

Detection

Azure Security Center customers who have opted into Standard-Tier can benefit from a new detection recently added to alert on specific indicators related to Petya ransomware running on an infected host - this is described in further detail below.
These alerts are accessed via the Detection pane highlighted below, and require the Azure Security Center Standard tier.
Security Center
An alert for Petya ransomware will show up as shown below:
Detected Petya
Drilling in provides more detail of the impacted VM and suspicious process or commandline that triggered the alert:
Detected Petya ransomware indicators
Note that although the detection alert relates to a specific host, because this ransomware attempts to propagate to other nearby machines, it is important to apply remediation steps to all on all hosts on the network, not just the host identified in the alert.
Please follow the remediation steps indicated in the Alert or in the Microsoft Malware Protection Center (MMPC) blog.

Saturday, 6 May 2017

Step by Step Windows Azure Point to Site VPN



There are many scenario in which we have to work on Microsoft Azure Cloud doing experiments and LABs, or we have to setup some Application Server’s on which different people have to work like a team, such as a team of developer is working on a project which is hosted on Microsoft Azure plate from and the developers are located in different geo location. These kind of scenario for which Azure provides Point to Site VPN Secure connectivity so that every individual connect remotely with a secure SSTP VPN connection and perform his job.
A Point-to-Site (P2S) configuration lets you create a secure connection from an individual client computer to a virtual network. P2S is a VPN connection over SSTP (Secure Socket Tunneling Protocol). Point-to-Site connections are useful when you want to connect to your VNet from a remote location, such as from home or a conference, or when you only have a few clients that need to connect to a virtual network. P2S connections do not require a VPN device or a public-facing IP address. You establish the VPN connection from the client computer. In this Lab, we will walk through the steps involved in setting up a remote P2S VPN with Microsoft Windows Azure Cloud plate form.

LAB Setup for Azure VPN

 










We need to following requirements before we start P2S VPN.
 
·       A valid Microsoft Azure subscription
·       Microsoft Windows SDK at client computers installed
·       Root and Client Certificate at client computers
·       Virtual Network in Azure
·       Network Subnet
·       Virtual Network Gateway in Azure
·       Gateway Subnet

Windows Azure Virtual Network


After successful login click New and search Virtual Network

 

Select Virtual Network, Select Resource Group and Click Create

 


Virtual Network Properties

Fill out Virtual Network properties as per your Network

 


Location you can chose as per your nearest Azure Data Center and click create it will take approximate 2 to 3 minutes and V Network will be created.

View Properties of Virtual Network  


You can view newly created virtual network settings, resource group and address space.