🪟Microsoft

Windows Server, Active Directory, Hyper-V, Azure Arc, Intune, Microsoft 365 — the full Microsoft infrastructure stack from domain controllers and Group Policy to hybrid cloud and containers.

Active Directory — How Windows Domains Work

ACTIVE-DIRECTORY

Active Directory is the identity and access management backbone of virtually every on-premises Windows enterprise environment. Understanding what a domain controller actually does, how forests and trusts work, and why AD relies on Kerberos and DNS explains the foundation that everything from file shares to VPN authentication is built on.

identityactive-directorywindows-serverkerberosldapdnsdomain-controller

Domain Controllers — The Pillars of AD DS

AD DS

Domain Controllers are the servers that make Active Directory work. This article covers what a DC does, how FSMO roles are distributed across the domain, the purpose of Read-Only Domain Controllers, and how to deploy DCs in Azure-connected hybrid environments.

microsoftwindows-serveractive-directoryad-dsdomain-controllerfsmorodchybrid

AD DS Sites and Replication — How Identity Spreads Across the Network

AD DS

AD DS replication is not a simple broadcast — it is a topology-aware system built around sites, site links, and an automatic topology generator. This article explains how changes propagate across domain controllers, how SYSVOL replication works, and how to diagnose replication failures.

microsoftwindows-serveractive-directoryad-dsreplicationsiteskccsysvoldfsr

AD DS Trusts — Crossing Domain and Forest Boundaries

AD DS

Active Directory trusts define the boundaries across which authentication and resource access can flow. This article covers trust direction, transitivity, the major trust types, and the security controls — SID filtering and selective authentication — that constrain what a trust actually permits.

microsoftwindows-serveractive-directoryad-dstrustskerberossid-filteringforest-trust

Group Managed Service Accounts — Passwords Active Directory Manages for You

AD DS

Service accounts with manually managed passwords are a persistent security liability. Group Managed Service Accounts (gMSAs) solve this by having Active Directory generate, rotate, and distribute complex passwords automatically, with no human ever knowing the credential.

microsoftwindows-serveractive-directoryad-dsgmsaservice-accountssecuritykds

Entra ID — Microsoft's Cloud Identity Platform

ENTRA-ID

Entra ID (formerly Azure Active Directory) is Microsoft's cloud-based identity and access management service. It is not simply 'AD in the cloud' — it has a fundamentally flat structure with no OUs, uses OAuth 2.0 and OIDC instead of Kerberos, and is built around modern authentication concepts like conditional access and identity protection.

identityentra-idazure-adoauth2oidcsamlconditional-accessmfa

Hybrid Identity — Bridging On-Premises AD and Entra ID

HYBRID-IDENTITY

Most enterprise environments aren't purely on-premises or purely cloud — they're hybrid. Microsoft Entra Connect synchronises on-premises Active Directory identities to Entra ID so users can authenticate to both with the same credentials. Understanding the three sync modes and their security trade-offs determines whether a phished password can be used against cloud resources.

identityhybrid-identityentra-connectazure-ad-connectphsptaadfssso

Entra Connect Cloud Sync — Lightweight Hybrid Identity

ENTRA ID

Entra Connect Cloud Sync is a provisioning agent that synchronises on-premises Active Directory identities to Microsoft Entra ID without requiring a dedicated sync server. This article covers its architecture, supported scenarios, limitations compared to full Entra Connect, and how to decide which tool fits your environment.

microsoftentra-idazure-adhybrid-identitycloud-syncprovisioningad-dsaz-800

Entra Connect Health — Monitoring Your Hybrid Identity Pipeline

ENTRA ID

Hybrid identity failures are often silent — a sync error or DC issue can break cloud access for hundreds of users before anyone notices. Entra Connect Health provides centralised monitoring of the sync pipeline, domain controllers, and AD FS infrastructure, surfacing problems before they become outages.

microsoftentra-idazure-adhybrid-identityconnect-healthmonitoringad-fsad-dsaz-800

Group Policy — Configuration at Domain Scale

GROUP-POLICY

Group Policy Objects (GPOs) are the primary mechanism for pushing configuration to every Windows machine and user in an Active Directory domain — from password complexity requirements and mapped drives to software installation and security baselines. Understanding how GPO inheritance and the LSDOU processing order works explains why a setting on a laptop isn't behaving the way the admin intended.

identitygroup-policygpoactive-directorywindowslsdouwmi-filter

Windows Admin Center — Modern Remote Management for Windows Server

WAC

Windows Admin Center is a browser-based management interface that consolidates most Server Manager and MMC console tasks into a single, extension-driven web UI. It operates in either gateway mode (centralised) or desktop mode (local) and integrates natively with Azure hybrid services.

microsoftwindows-serverwacmanagementhybrid

PowerShell Remoting — Remote Administration at Scale

POWERSHELL

PowerShell Remoting uses the WinRM protocol to execute commands on remote machines, enabling both interactive sessions and parallel batch operations across large server fleets. Just Enough Administration (JEA) extends this model with constrained endpoints that delegate specific capabilities to non-administrator accounts.

microsoftwindows-serverpowershellwinrmjeasecurity

Azure Arc — Managing Non-Azure Machines from Azure

AZURE ARC

Azure Arc extends the Azure management plane to servers running anywhere — on-premises data centres, third-party clouds, or edge locations — by installing a lightweight agent that registers each machine as an Azure resource. Once onboarded, Arc-enabled servers are subject to the same Azure Policy, RBAC, and monitoring tooling as native Azure VMs.

microsoftazureazure-archybridpolicymanagement

Update Management — Keeping Windows Server Patched at Scale

WSUS

Unpatched servers remain the most common vector for infrastructure compromise. This article covers the evolution from on-premises WSUS through to Azure Update Manager, and explains how to think about patch rings, maintenance windows, and compliance reporting across a hybrid server fleet.

microsoftwindows-serverwsuspatchingazuresecurity

Microsoft Defender for Cloud — Security Posture and Threat Protection

DEFENDER

Microsoft Defender for Cloud combines cloud security posture management (CSPM) with cloud workload protection (CWP) into a single service. It continuously assesses your Azure, hybrid, and multi-cloud environments, produces a quantified secure score, and provides active threat detection through integration with Microsoft Defender for Endpoint.

microsoftazuredefendersecuritycspmcwparc

Azure Automation and DSC — Runbooks, Drift Prevention, and Hybrid Workers

AUTOMATION

Azure Automation is a cloud service for process automation and configuration management across Azure, on-premises, and multi-cloud environments. Runbooks automate repetitive operational tasks, while Desired State Configuration (DSC) declaratively defines and enforces server configuration — detecting and correcting drift without human intervention.

microsoftazureautomationdscpowershellhybridconfiguration-management

Microsoft Intune — Cloud-Based Endpoint Management

INTUNE

Microsoft Intune is the cloud-based MDM and MAM platform that replaces on-premises SCCM for device management in modern Microsoft 365 deployments. It enrolls and manages Windows, macOS, iOS, and Android devices — pushing configuration, enforcing compliance, deploying apps, and wiping lost devices — without requiring a VPN or on-premises infrastructure.

endpointintunemdmmammicrosoft-365conditional-accessautopilotcompliance

Endpoint Imaging — Deploying Windows at Scale

IMAGING

Imaging is the process of deploying a pre-configured Windows installation to multiple machines. The toolchain has evolved from WDS (unicast/multicast network PXE boot) through MDT (task sequences, driver injection, application installation) to Windows Autopilot (cloud-first, no custom image required). Understanding the full stack explains why enterprises choose each approach and where they're headed.

endpointimagingwdsmdtautopilotwimpxeosdsysprep

Hyper-V — Microsoft's Hypervisor

HYPER-V

Hyper-V is Microsoft's Type 1 hypervisor, built into Windows Server and Windows 10/11 Pro. Unlike ESXi which runs on dedicated hardware, Hyper-V integrates with Windows Server to provide virtualisation alongside the existing management infrastructure — Active Directory, SCOM, SCVMM. Understanding the parent/child partition model, virtual switches, and Failover Clustering explains how Windows-centric shops build resilient virtualised infrastructure.

virtualizationhyper-vwindows-serverfailover-clusteringlive-migrationreplicavhd

Hyper-V Networking — Virtual Switches, NIC Teaming, and SR-IOV

HYPER-V

Hyper-V's virtual network stack translates physical network hardware into a flexible, software-defined layer that VMs and the host management OS share. Understanding vSwitch types, NIC teaming strategies, and hardware offload technologies like SR-IOV and RDMA is essential for designing performant and resilient virtualised infrastructure.

microsoftwindows-serverhyper-vnetworkingsr-iovrdmanic-teaming

Hyper-V High Availability — Live Migration, Failover Clustering, and Replica

HYPER-V

High availability for Hyper-V workloads is not a single feature but a stack of complementary technologies each addressing a different failure scenario. Live Migration handles planned downtime, Failover Clustering responds to unplanned host failures, and Hyper-V Replica provides site-level disaster recovery — understanding when each applies is fundamental to designing resilient virtualised infrastructure.

microsoftwindows-serverhyper-vhigh-availabilityfailover-clusteringlive-migrationstorage-spaces-direct

Windows Containers — Isolation Without the Hypervisor Overhead

CONTAINERS

Windows containers package applications and their dependencies into portable, isolated units that share the host OS kernel rather than emulating full hardware. Understanding the two isolation modes, the available base images, and how Windows containers fit into a broader Kubernetes or Docker deployment is essential for modernising Windows Server workloads.

microsoftwindows-servercontainersdockerkuberneteshyper-v-isolation

Windows Server DNS — Name Resolution for Hybrid Infrastructure

DNS

Windows Server DNS is not simply a DNS server that happens to run on Windows — its deep integration with Active Directory DS makes it the authoritative foundation for domain authentication, service location, and secure dynamic registration. Understanding AD-integrated zones, SRV record dependencies, and hybrid forwarding patterns is essential for any Windows infrastructure role.

microsoftwindows-serverdnsactive-directoryhybriddnssecconditional-forwarders

Windows Server DHCP — IP Address Assignment at Scale

DHCP

Windows Server DHCP extends the base DHCP protocol with Active Directory integration, failover redundancy, and centralised management features that make it suitable for enterprise-scale deployments. Understanding scope design, option precedence, failover modes, and the relay agent model is foundational for any Windows Server infrastructure role.

microsoftwindows-serverdhcpnetworkingipamfailoveractive-directory

IPAM — Centralised IP Address Management in Windows Server

IPAM

Windows Server IPAM provides a centralised view of IP address space, DHCP scope state, and DNS zone data across the entire infrastructure from a single management point. Understanding what IPAM manages, how it discovers infrastructure, and where its limitations lie is important for evaluating when it meets enterprise needs and when a third-party solution is required.

microsoftwindows-serveripamdhcpdnsnetworkingrbac

Network Policy Server — RADIUS Authentication for Network Access

NPS

Network Policy Server is Microsoft's RADIUS implementation, providing centralised authentication, authorisation, and accounting for 802.1X wired and wireless access, VPN, and other network access scenarios. Understanding how NPS policies are structured, which EAP methods apply to which use cases, and how the Azure MFA extension extends NPS capabilities is foundational for securing network access in Windows environments.

microsoftwindows-servernpsradius802.1xvpneapmfanetwork-access

Remote Access — VPN, DirectAccess, and Always On VPN

RRAS

Windows Server's Remote Access role has evolved from simple dial-up routing through RRAS VPN and DirectAccess to the modern Always On VPN architecture. Each technology was designed for a different threat model and management approach, and understanding the architectural differences — not just the configuration — explains when each applies and why Always On VPN is the current standard for managed Windows devices.

microsoftwindows-serverrrasvpndirectaccessalways-on-vpnikev2sstpremote-access

Web Application Proxy — Publishing Internal Apps Securely

WAP

Web Application Proxy is a Remote Access role service in Windows Server that publishes internal web applications and services to external users without placing servers in a DMZ or opening inbound firewall rules. It integrates tightly with AD FS to provide pre-authentication at the perimeter, ensuring unauthenticated requests never reach internal infrastructure.

microsoftwindows-serverwapadfsreverse-proxyremote-accessaz-800

Storage Spaces — Software-Defined Storage in Windows Server

STORAGE

Storage Spaces is the software-defined storage layer built into Windows Server, enabling administrators to pool heterogeneous physical disks into a unified capacity pool and provision virtual disks with configurable resiliency. It decouples storage management from physical hardware, allowing flexible provisioning, tiering, and high availability without dedicated storage controllers.

microsoftwindows-serverstoragestorage-spacess2dsdsaz-800

Storage Replica — Block-Level Replication for Windows Server

STORAGE

Storage Replica is a synchronous and asynchronous block-level volume replication feature built into Windows Server 2016 and later. It provides disaster recovery and high availability without third-party software by replicating storage at a level below the filesystem, making it applicable to any workload regardless of the data format stored on the volume.

microsoftwindows-serverstoragestorage-replicareplicationdraz-800

DFS — Distributed File System Namespaces and Replication

DFS

The Distributed File System in Windows Server comprises two independently useful but complementary components: DFS Namespaces, which presents a unified virtual folder tree that maps to shares on multiple servers, and DFS Replication, which synchronises folder content between servers using an efficient delta-compression algorithm. Together they enable transparent, highly available file access across distributed environments.

microsoftwindows-serverdfsdfs-ndfs-rfile-servicesaz-800

Azure File Sync — Extend Windows File Servers to the Cloud

AZURE

Azure File Sync synchronises Windows file server shares to Azure Files, creating a cloud-backed copy of on-premises data while allowing servers to cache only the most-accessed files locally through cloud tiering. It supports multi-server sync, enabling branch offices and remote sites to share file content via a common cloud endpoint without requiring direct server-to-server replication.

microsoftazurefile-syncazure-filescloud-tieringhybridaz-800

Data Deduplication — Eliminating Redundant Blocks on Windows Server

STORAGE

Data Deduplication identifies and eliminates redundant data chunks across files on a volume, storing each unique chunk only once and replacing duplicates with lightweight pointers. Running as a post-process background job, it reduces storage consumption on eligible volumes without impacting write performance, and delivers the most dramatic savings on workloads with inherently repetitive data such as VDI environments and general-purpose file shares.

microsoftwindows-serverstoragededuplicationdedupaz-800

Exchange Online — Microsoft 365 Email Architecture

EXCHANGE-ONLINE

Exchange Online is the hosted email and calendaring component of Microsoft 365. It replaced on-premises Exchange Server for most organisations, but the underlying concepts — mailbox databases, transport pipeline, connectors, DAGs — are still relevant even if Microsoft now manages the infrastructure. Understanding Exchange Online's architecture explains why email delivery sometimes fails and how to fix it.

emailexchange-onlinemicrosoft-365smtptransportconnectorsautodiscovermx

Microsoft 365 Tenant — The Cloud Workplace Foundation

M365-TENANT

An M365 tenant is the top-level organisational boundary in Microsoft's cloud — a dedicated instance of Entra ID plus a subscription to Microsoft services. Understanding what a tenant is, how licenses map to services, and what the admin centres actually control is the prerequisite for everything from deploying Exchange Online to configuring Teams telephony.

emailmicrosoft-365tenantentra-idlicensesteamssharepointonedrive

Azure Monitor and Log Analytics — Observability for the Microsoft Stack

MONITORING

Azure Monitor is Microsoft's unified observability platform, collecting time-series metrics and structured log data from Azure resources, on-premises servers via Azure Arc, and applications. Log Analytics Workspaces serve as the central repository for log data, queried using the Kusto Query Language, while alert rules, workbooks, and integrations with Defender for Cloud make it the operational backbone for both cloud and hybrid Microsoft environments.

microsoftazuremonitoringlog-analyticskqlazure-monitorarcaz-800

Microsoft 365 DNS Domains — Connecting Your Domain to the Cloud

M365

Every Microsoft 365 tenant starts life with a .onmicrosoft.com domain, but real-world deployments require custom domain names. DNS is the bridge that proves ownership, routes mail, enables Teams, and ties every M365 workload to your organisation's identity.

microsoftm365dnsexchange-onlineteamsintunedomains

Microsoft 365 Admin Roles — Delegating Without Giving Away the Keys

M365

Microsoft 365 provides a layered set of administrative roles that allow organisations to delegate specific management tasks without granting blanket control. Understanding which role fits which responsibility is fundamental to operating a least-privilege environment.

microsoftm365entra-idrbacadmin-rolesdefenderpurviewsecurity

Privileged Identity Management — Just-in-Time Admin Access

PIM

Privileged Identity Management converts permanent admin role assignments into time-limited, approval-gated activations. It is the primary tool Microsoft recommends for reducing the attack surface created by standing privileged access in an Entra ID tenant.

microsoftentra-idpimprivileged-accesssecurityidentitym365

Administrative Units — Scoped Delegation in Entra ID

ENTRA ID

Administrative Units are containers in Entra ID that restrict an administrator's scope to a defined subset of users, groups, or devices. They solve the problem of over-broad role assignments in large organisations where different teams should only manage their own populations.

microsoftentra-idadministrative-unitsrbacdelegationidentitym365

Conditional Access — Zero Trust Policy Enforcement for M365

ENTRA ID

Conditional Access is the Entra ID policy engine that evaluates every access request against a set of signals — user identity, device state, location, application, and risk level — before deciding whether to allow, block, or require additional verification. It is the primary technical control for implementing Zero Trust in Microsoft 365.

microsoftentra-idconditional-accesszero-trustmfasecuritym365identity-protection

MFA and SSPR — Securing and Recovering Identities in Entra ID

ENTRA ID

How Multi-Factor Authentication and Self-Service Password Reset work together to protect identities and remove helpdesk dependency in Entra ID.

microsoftentra idmfassprpasswordlessidentityauthentication

Entra ID Identity Protection — Detecting and Responding to Risky Sign-ins

ENTRA ID

How Entra ID Identity Protection uses Microsoft threat intelligence to detect compromised users and suspicious sign-ins, and what risk-based policies do about them.

microsoftentra ididentity protectionriskconditional accesssecurityp2

Entra Password Protection — Banning Weak Passwords Across the Organisation

ENTRA ID

How Entra ID's banned password lists and Smart Lockout defend against predictable passwords and brute-force attacks, both in the cloud and on-premises Active Directory.

microsoftentra idpassword protectionsmart lockoutbanned passwordshybridsecurity

Microsoft 365 Defender — Extended Detection and Response for the M365 Stack

DEFENDER

How Microsoft 365 Defender unifies signals from across the M365 security stack into a single XDR platform, and what Defender for Office 365 does to protect email and collaboration.

microsoftdefenderxdrsecure scoreincidentssafe attachmentssafe linksoffice 365threat analytics

Microsoft Purview — Data Governance and Compliance for M365

PURVIEW

How Microsoft Purview classifies sensitive data, enforces retention, prevents data loss, and supports legal and regulatory compliance across the Microsoft 365 estate.

microsoftpurviewcompliancedlpsensitivity labelsretentionediscoveryinformation protection

Windows Autopilot — Cloud-First Device Provisioning

AUTOPILOT

Windows Autopilot is a cloud service that transforms a factory-fresh Windows device into a fully configured corporate endpoint without IT ever touching the hardware. The four deployment modes cover everything from standard employee onboarding to kiosk provisioning to warehouse pre-staging.

microsoftautopilotintuneentra-idmdmoobeespdeployment

Windows Update for Business — Managing Updates Without WSUS

WINDOWS

Windows Update for Business (WUfB) is a policy-driven service that controls when Windows 10/11 devices receive quality and feature updates directly from Microsoft. No on-premises WSUS server required — deferral periods, deadlines, and update rings give organisations predictable update delivery without local infrastructure.

microsoftwindowsupdateswufbintunewsuspatchingupdate-rings

Intune Enrollment — Getting Devices Under Management

INTUNE

Before Intune can deliver policies, apps, or compliance checks to a device, the device must be enrolled. Enrollment establishes the management relationship and installs the MDM agent. The method varies by platform and ownership model — from fully automated Autopilot flows for new Windows devices to user-initiated Company Portal enrollment for BYOD.

microsoftintunemdmenrollmentautopilotandroid-enterpriseapple-business-managerco-management

Intune Compliance Policies — Defining and Enforcing Device Health Standards

INTUNE

Compliance policies define the minimum security state a device must be in to be considered trustworthy. Intune evaluates the device against the policy and reports a compliance state — which Conditional Access in Entra ID then uses as a gate for accessing corporate resources.

microsoftintunecomplianceconditional-accessbitlockerentra-idzero-trustsecurity

Intune App Deployment — Delivering and Managing Applications at Scale

INTUNE

Intune supports multiple application types with different trade-offs in flexibility, packaging complexity, and supported platforms. Win32 apps offer the most control for traditional Windows software; Microsoft 365 Apps deploy Office without installation media; MSIX provides modern clean packaging. Assignment intents and dependency chains let administrators model the full application lifecycle from delivery to supersedence.

microsoftintuneappswin32msixm365-appsintunewincompany-portaldeployment

Microsoft Defender Antivirus — Built-in Endpoint Protection for Windows

DEFENDER

Microsoft Defender Antivirus is the built-in AV engine for Windows 10/11, active by default when no third-party product displaces it. Managed through Intune, GPO, or ConfigMgr, it provides real-time scanning, cloud-delivered verdicts, Attack Surface Reduction rules, Controlled Folder Access, and Network Protection — all tunable from a single Endpoint Security policy.

microsoftdefenderantivirusendpoint-securityasrintunetamper-protectionwindows

BitLocker — Full Disk Encryption for Windows Endpoints

BITLOCKER

BitLocker is Windows' built-in full volume encryption feature, protecting data on lost or stolen devices by encrypting the entire OS and data volumes with AES. Integrated with the TPM for transparent unlock, managed through Intune for silent deployment, and tied to Entra ID for automatic recovery key escrow, BitLocker is the standard disk encryption solution for Intune-managed Windows estates.

microsoftbitlockerencryptiontpmintuneendpoint-securityrecovery-keywindows

Windows Hello for Business — Passwordless Authentication for the Enterprise

WHFB

Windows Hello for Business replaces the password at Windows sign-in with a TPM-bound cryptographic key pair unlocked by biometric or PIN. The password is never transmitted, never replayable from the network, and never useful to a phisher. Deployed via Intune, it integrates with Entra ID and on-premises AD through several trust models suited to different infrastructure maturity levels.

microsoftwindows-hellowhfbpasswordlesstpmauthenticationintuneentra-id

Microsoft Defender for Endpoint — EDR and Device Protection

DEFENDER-FOR-ENDPOINT

How Microsoft Defender for Endpoint provides endpoint detection and response (EDR) across Windows, macOS, Linux, iOS, and Android — collecting behavioural telemetry, detecting threats post-breach, enabling investigation timelines, and automating remediation through the Microsoft 365 Defender portal.

defender-for-endpointedrendpoint-securitymd-101ms-102

Endpoint Analytics — Device Experience and Performance Insights

ENDPOINT-ANALYTICS

How Endpoint Analytics in Microsoft Intune measures the real-world performance and reliability of managed devices — tracking startup times, restart frequency, app reliability, and hardware readiness — giving IT teams data to proactively fix issues before users call the helpdesk.

endpoint-analyticsintunemicrosoft-endpoint-managermd-101