WEBINAR:  Pay-As-You-Go Market Disruption – How to Build a Strategic Licensing Plan

You might have missed our live webinar lunch-n-learn series on December 9th, but you don't have to miss out on licensing strategy. We have a recording of the webinar below so you don't have to miss out! Watch the video to hear Founder of Managed Solution, Sean Ferrel, discuss how Pay-as-You-Go Licensing can help you save money and keep your business growing.
A Strategic Licensing Plan can save you and your business from pouring time and money into cloud solutions. Learn how to compare, purchase, provision and manage licensing through these game-changing cloud licensing portals.

 

[vc_row][vc_column][vc_cta_button2 h2="Licensing and Licensing Deployments have never been easier." title="Purchase Pay As You Go Licensing Through Your CSP Partner Today! " link="url:http%3A%2F%2Finfo.managedsolution.com%2Fpay-as-you-go||"]Managed Solution is in the top 1% of Microsoft Cloud Service Providers worldwide, is an award-winning Microsoft National Solutions Provider and premier partner aligned with Microsoft’s mission to empower every person and every organization on the planet to achieve more.[/vc_cta_button2][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]

  • Why rapidly changing technology should be considered for OpX
  • How CFOs & CTOs are finding a common ground on what technology is needed
  • Services, features and options that can be purchased and used as needed on demand
  • The most cost-effective way to manage self-serve technology licensing
  • How to pay only for the IT services needed with pay-as-you-go scaling options
  • How to get up to the minute funding information

[/vc_column_text][/vc_column][/vc_row]

[vc_row equal_column_height="equal-column" parallax="content-moving" css=".vc_custom_1510683183704{background-color: #7f7f7f !important;}" padding_bottom="50px"][vc_column width="1/2"][vc_column_text css_animation="appear"][/vc_column_text][grve_button button_text="Active Directory Health Check Project Accelerator (PDF)" button_color="green" button_hover_color="white" button_link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2017%2F11%2FActive-Directory-Pass-Fail.pdf|||"][/vc_column][vc_column width="1/2"][vc_column_text]

A Healthy Active Directory Can Protect And Transform Your Business

If your Active Directory is unhealthy it can be the root cause to countless issues in a business environment.
How certain are you that your environment will PASS? Contact us today to get started on your Active Directory Pass / Fail Project 800-208-3617.

[/vc_column_text][/vc_column][/vc_row][vc_row parallax="content-moving" css=".vc_custom_1510686800552{background-color: #1e73be !important;}" padding_bottom="50px" padding_top="50px" margin_bottom="0"][vc_column width="1/2"][vc_column_text css_animation="appear"][/vc_column_text][grve_button button_text="Security As A Service Project Accelerator (PDF)" button_color="green" button_hover_color="white" button_link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2017%2F11%2FEntperrise-Mobility-Security-As-A-Service-Accelerator.pdf|||"][/vc_column][vc_column width="1/2"][vc_column_text]

Secure Your Staff and Their Devices with Enterprise Mobility + Security (EMS) from Microsoft. EMS lets you keep corporate data secure even on an unsecure network. Meet the needs of your mobile workforce—and their roaming devices.

Managed Solution provides businesses with complete, end-to-end solutions for their technology needs.
Get cutting-edge security as a service to enable mobility without risking company data. For more information call 800-208-3617

[/vc_column_text][/vc_column][/vc_row][vc_row parallax="content-moving" css=".vc_custom_1510687090087{background-color: #dd9933 !important;}" padding_bottom="50px" padding_top="50px" margin_bottom="0"][vc_column width="1/2"][vc_column_text css_animation="appear"][/vc_column_text][grve_button button_text="Data Center Automation Quick Start Project Accelerator (PDF)" button_color="green" button_hover_color="white" button_link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2017%2F11%2FSystems-Center-Operations-Manager.pdf|||"][/vc_column][vc_column width="1/2"][vc_column_text]

Monitor Critical Services & Applications With Microsoft System Center Operations Manager

With Infrastructure monitoring and insights for high performance, Managed Solution’s unmatched methodology to deliver Systems Health we can bring a new level of security to your network.
Get Started Today 800-208-3617.

[/vc_column_text][/vc_column][/vc_row][vc_row parallax="content-moving" css=".vc_custom_1510683183704{background-color: #7f7f7f !important;}" padding_bottom="50px" padding_top="50px" margin_bottom="0"][vc_column width="1/2"][vc_column_text css_animation="appear"][/vc_column_text][grve_button button_text="Enterprise Class Remote Client Health with System Center + SHARC Project Accelerator (PDF)" button_color="green" button_hover_color="white" button_link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2018%2F04%2FSystem-Center-Configuration-Manager-with-SHARC-no-pricing.pdf|||"][/vc_column][vc_column width="1/2"][vc_column_text]

With SCCM & our proprietary SHARC tool, automating your client’s computers health has never been easier.

You can discover, diagnose, and clean all your client devices with just a mouse click, even the ones you didn’t know were on your network... without human intervention.
The future of client health automation is here.

[/vc_column_text][/vc_column][/vc_row][vc_row parallax="content-moving" css=".vc_custom_1510702064784{background-color: #dd9933 !important;}" padding_top="50px" padding_bottom="50px" margin_bottom="0"][vc_column width="1/2"][vc_column_text css_animation="appear"][/vc_column_text][grve_button button_text="Office 365 Migration Project Accelerator (PDF)" button_color="green" button_hover_color="white" button_link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2017%2F11%2FSystems-Center-Operations-Manager.pdf|||"][/vc_column][vc_column width="1/2"][vc_column_text]

Optimize Uptime, Take the Fast Track to the Cloud

See how our expert engineers are helping business move quickly & securely to the cloud.

[/vc_column_text][/vc_column][/vc_row][vc_row parallax="content-moving" css=".vc_custom_1510702064784{background-color: #dd9933 !important;}" padding_top="50px" padding_bottom="50px" margin_bottom="0"][vc_column width="1/2"][vc_column_text css_animation="appear"][/vc_column_text][grve_button button_text="Azure Quick Start (PDF)" button_color="green" button_hover_color="white" button_link="url:http%3A%2F%2Fwww.managedsolution.com%2Fwp-content%2Fuploads%2F2018%2F04%2FAzure-Quick-Start-and-Pilot-Workshop-2017.pdf|||"][/vc_column][vc_column width="1/2"][vc_column_text]

Could this be you?

  • You have purchased Azure licensing, but it is not yet being used.
  • You are currently evaluating Azure for disaster recovery, development, or infrastructure needs.
  • You have implemented Azure, but you are looking to expand and need more assistance with governance or automation.
Azure Quick Start is customizable to your needs. Learn more.

[/vc_column_text][/vc_column][/vc_row]

[vc_row][vc_column][vc_column_text]The security protocol that isvused to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness.

Mathy Vanhoef, a security expert at Belgian university KU Leuven, discovered the weakness in the wireless security protocol WPA2, and published details of the flaw on Monday morning.

“Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,” Vanhoef’s report said. “This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos and so on.

Vanhoef emphasised that the attack works against all modern protected wifi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.”

The vulnerability affects a number of operating systems and devices, the report said, including Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys and others.

“If your device supports wifi, it is most likely affected,” Vanhoef wrote. “In general, any data or information that the victim transmits can be decrypted … Additionally, depending on the device being used and the network setup, it is also possible to decrypt data sent towards the victim (e.g. the content of a website).”

Vanhoef gave the weakness the codename Krack, short for Key Reinstallation AttaCK.

Britain’s National Cyber Security Centre said in a statement it was examining the vulnerability. “Research has been published today into potential global weaknesses to wifi systems. The attacker would have to be physically close to the target and the potential weaknesses would not compromise connections to secure websites, such as banking services or online shopping.

“We are examining the research and will be providing guidance if required. Internet security is a key NCSC priority and we continuously update our advice on issues such as wifi safety, device management and browser security.”

The United States Computer Emergency Readiness Team (Cert) issued a warning on Sunday in response to the vulnerability.

“The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection and others,” the alert says, detailing a number of potential attacks. It adds that, since the vulnerability is in the protocol itself, rather than any specific device or software, “most or all correct implementations of the standard will be affected”.

The development is significant because the compromised security protocol is the most secure in general use to encrypt wifi connections. Older security standards have been broken in the past, but on those occasions a successor was available and in widespread use.

Crucially, the attack is unlikely to affect the security of information sent over the network that is protected in addition to the standard WPA2 encryption. This means connections to secure websites are still safe, as are other encrypted connections such as virtual private networks (VPN) and SSH communications.

However, insecure connections to websites – those which do not display a padlock icon in the address bar, indicating their support for HTTPS – should be considered public, and viewable to any other user on the network, until the vulnerability is fixed.

Equally, home internet connections will remain difficult to fully secure for quite some time. Many wireless routers are infrequently if ever updated, meaning that they will continue to communicate in an insecure manner. However, Vanhoef says, if the fix is installed on a phone or computer, that device will still be able to communicate with an insecure router. That means even users with an unpatched router should still fix as many devices as they can, to ensure security on other networks.

Alex Hudson, the chief technical officer of subscription service Iron, said that it is important to “keep calm”.

“There is a limited amount of physical security already on offer by wifi: an attack needs to be in proximity,” Hudson wrote. “So, you’re not suddenly vulnerable to everyone on the internet. It’s very weak protection, but this is important when reviewing your threat level.

“Additionally, it’s likely that you don’t have too many protocols relying on WPA2 security. Every time you access an HTTPS site … your browser is negotiating a separate layer of encryption. Accessing secure websites over wifi is still totally safe. Hopefully – but there is no guarantee – you don’t have much information going over your network that requires the encryption WPA2 provides.”

There’s likely to be a delay before the vulnerability is used to actually attack networks in the wild, says Symantec researcher Candid Wuest. “It’s quite a complex attack to carry out in practice, but we’ve seen similar before, so we know it’s possible to automate.

“Small businesses and people at home should be concerned, but not too worried,” Wuest added, advising most users to simply apply the updates to their software as and when it becomes available.

The most important lesson from the weakness, he said, was that relying on any one security feature is risky. “You shouldn’t be trusting one single point of failure for all your security. Don’t rely on just your wifi, use a VPN or secure connection for anything important.”

Different devices and operating systems are impacted to differing degrees based on how they implement the WPA2 protocol. Among the worst hit are Android 6.0 (Marshmallow) and Linux, due to a further bug that results in the encryption key being rewritten to all-zeros; iOS and Windows, meanwhile, are among the most secure, since they don’t fully implement the WPA2 protocol. No tested device or piece of software was fully immune to the weakness, however.

The international Cert group, based at Carnegie Mellon University, informed technology companies of the flaw on 28 August, meaning that most have had around a month and a half to implement a fix. The Guardian has asked Apple, Google, Microsoft and Linksys the status of their patches. Google said: “We’re aware of the issue, and we will be patching any affected devices in the coming weeks.” Microsoft said: “We have released a security update to address this issue. Customers who apply the update, or have automatic updates enabled, will be protected.” No other vendor has replied at press time.[/vc_column_text][/vc_column][/vc_row]

Last month a preview of the Azure Analysis Services web designer was released. This new browser-based experience will allow developers to start creating and managing Azure Analysis Services (AAS) semantic models quickly and easily. While SQL Server Data Tools (SSDT) and SQL Server Management Studio (SSMS) are still the primary tools for development, this new experience is intended to make modeling fast and easy. It is great for getting started on a new model or to do things such as adding a new measure to an existing model.

With this round of updates, we are adding the most significant modeling feature yet, the ability to edit your model visually with the new diagram editor.

Diagram

This new diagram editor was designed for making changes on models with a large number of tables in mind. To make the best use of screen space, you are not required to make all the tables visible on the diagram at once. Tables can be dragged into the diagram from the table list and can be closed from view by clicking the three dots at the top right of the table.

image

New measures can also be added to a table by clicking on the same three dots and then clicking measures to bring up the measure editor. When you want to change the properties of a table, measure or column, you no longer need to do this one object at a time. With multi select, you can select as many objects as you want at one time and update the properties for all of them in one batch.

image

By dragging a column from one table to another, a relationship will be created between those tables. You can edit the relationship by clicking on the relationship line which will bring up the relationship editor.

While the new diagram editor is a great way to easily understand and make bulk changes to your model, you still have all of the power of the existing JSON editor. You can switch between the editors by changing the view at the top of the screen.

image

As you enhance your model, you can continuously test it out by switching to the query view at the top of the screen.

image

The query view will give you a preview of what your model will look like when used in tools like the Power BI desktop, and it will also let you run sample queries against your model so that you can check your data.

image

[vc_row gmbt_prlx_parallax="up" font_color="#ffffff" css=".vc_custom_1467066066924{padding-top: 170px !important;padding-right: 0px !important;padding-bottom: 190px !important;padding-left: 0px !important;background: rgba(55,82,161,0.66) url(https://managedsolut.wpengine.com/wp-content/uploads/2017/08/managed-solution-azure-1.png) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;*background-color: rgb(55,82,161) !important;}"][vc_column][vc_column_text]

Special Offer For New Azure Customers: Do You Qualify For Microsoft Funding?

Customers Profit with Managed Solution

[/vc_column_text][/vc_column][/vc_row][vc_row parallax="content-moving" css=".vc_custom_1465945819577{background-color: #e98922 !important;}"][vc_column width="1/2"][vc_column_text]

100,000 new customers are signing up for Azure subscriptions every month. Microsoft's Azure Everywhere Program is designed to help customers get up and running with their first workload of Azure, or additional net new workloads. Now is the time to transform your business operations with Microsoft Azure.

Complete the form on the right to see if you qualify.

Qualified customers can receive:

  • Cost comparison for on-premise vs cloud.

  • Set up Proof of Concept.

  • Workshop to set up new workloads on Azure.

  • OpX vs CapX monthly consumption estimates.

  • Credit to consume Azure for 30 days.

  • Technical business outcome roadmap.

  • Possible funding available for deployment projects.

*Funding programs are available for a limited time. Qualified candidates must have at least $1,000 of monthly consumption or spend.

 

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css_animation="appear"]
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]Find your best path to a truly consistent hybrid cloud[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width="1/4"][vc_column_text]

Overcome complexity and optimize your existing assets

Identify workloads you can move to the cloud and decide which assets to keep on-premises, while using common skill sets across both.

[/vc_column_text][/vc_column][vc_column width="1/4"][vc_column_text]

Help your developers work more productively together

Maximize existing skills by migrating to a hybrid cloud solution, and get a flexible, unified approach to building apps that can run in the cloud or on-premises.

[/vc_column_text][/vc_column][vc_column width="1/4"][vc_column_text]

Centralize management and security across your hybrid cloud

Gain visibility and control over all assets from your datacenter to the cloud.

[/vc_column_text][/vc_column][vc_column width="1/4"][vc_column_text]

Boost employee productivity while protecting corporate information

Provide single sign-on to on-premises and cloud apps from virtually anywhere.

[/vc_column_text][/vc_column][/vc_row]

Through the use of Azure Active Directory (AD) Privileged Identity Management, you can manage, control, and monitor access within your organization to resources in Azure AD, as well as other Microsoft online services such as Office 365 or Microsoft Intune.

Organizations aim to minimize the number of people who have access to secure information and resources in order to decrease the chances of a malicious user gaining access. However, users still need to carry out privileged operations in Azure, Office 365, or SaaS apps. As a result, organizations give users privileged access in Azure AD without monitoring what those users are doing with their admin privileges. Azure AD Privileged Identity Management helps to resolve the risk created by this dilemma.

Azure AD Privileged Identity Management helps you:

  • See which users are Azure AD administrators
  • Enable on-demand, "just in time" administrative access to Microsoft Online Services like Office 365 and Intune
  • Get reports about administrator access history and changes in administrator assignments
  • Get alerts about access to a privileged role
  • Require approval to activate (Preview)

Azure AD Privileged Identity Management can manage the built-in Azure AD organizational roles, including (but not limited to):

  • Global Administrator
  • Billing Administrator
  • Service Administrator
  • User Administrator
  • Password Administrator

Just in time administrator access

Historically, users could be assigned to an admin role through the Azure classic portal or Windows PowerShell. As a result, that user becomes a permanent admin, always active in the assigned role. Azure AD Privileged Identity Management introduces the concept of an eligible admin. Eligible admins should be users that need privileged access every now and then, but not all of the time. The role is inactive until the user needs access, then they complete an activation process and become an active admin for a predetermined amount of time.

Enable Privileged Identity Management for your directory

You can start using Azure AD Privileged Identity Management in the Azure portal. (NOTE: You must be a global administrator with an organizational account, for example, @yourdomain.com, not a Microsoft account - for example, @outlook.com - to enable Azure AD Privileged Identity Management for a directory)

  1. Sign in to the Azure portal as a global administrator of your directory.
  2. If your organization has more than one directory, select your username in the upper right-hand corner of the Azure portal. Select the directory where you will use Azure AD Privileged Identity Management.
  3. Select More services and use the Filter textbox to search for Azure AD Privileged Identity Management.
  4. Check Pin to dashboard and then click Create. The Privileged Identity Management application opens.

If you're the first person to use Azure AD Privileged Identity Management in your directory, then the security wizard walks you through the initial assignment experience. After that you automatically become the first Security administrator and Privileged role administrator of the directory.

Only a privileged role administrator can manage access for other administrators. You can give other users the ability to manage in PIM.

Privileged Identity Management admin dashboard

Azure AD Privileged Identity Manager provides an admin dashboard that gives you important information such as:

  • Alerts that point out opportunities to improve security
  • The number of users who are assigned to each privileged role
  • The number of eligible and permanent admins
  • A graph of privileged role activations in your directory

PIM dashboard - screenshot

Privileged role management

With Azure AD Privileged Identity Management, you can manage the administrators by adding or removing permanent or eligible administrators to each role.

PIM add/remove administrators - screenshot

Configure the role activation settings

Using the role settings you can configure the eligible role activation properties including:

  • The duration of the role activation period
  • The role activation notification
  • The information a user needs to provide during the role activation process
  • Service ticket or incident number
  • Approval workflow requirements - Preview

PIM settings - administrator activation - screenshot

Note that in the image, the buttons for Multi-Factor Authentication are disabled. For certain, highly privileged roles, we require MFA for heightened protection.

Role activation

To activate a role, an eligible admin requests a time-bound "activation" for the role. The activation can be requested using the Activate my role option in Azure AD Privileged Identity Management.

An admin who wants to activate a role needs to initialize Azure AD Privileged Identity Management in the Azure portal.

Role activation is customizable. In the PIM settings, you can determine the length of the activation and what information the admin needs to provide to activate the role.

PIM administrator request role activation - screenshot

Review role activity

There are two ways to track how your employees and admins are using privileged roles. The first option is using Directory Roles audit history. The audit history logs track changes in privileged role assignments and role activation history.

PIM activation history - screenshot

The second option is to set up regular access reviews. These access reviews can be performed by and assigned reviewer (like a team manager) or the employees can review themselves. This is the best way to monitor who still requires access, and who no longer does.

Azure AD PIM at subscription expiration

Prior to reaching general availability Azure AD PIM was in preview and there were no license checks for a tenant to preview Azure AD PIM. Now that Azure AD PIM has reached general availability, trial or paid licenses must be assigned to the administrators of the tenant to continue using PIM. If your organization does not purchase Azure AD Premium P2 or your trial expires, mostly all of the Azure AD PIM features will no longer be available in your tenant. You can read more in the Azure AD PIM subscription requirements

Whether in reaction to changes coming from IoT devices, in response to user clicks on mobile apps, or for the initiation of business processes from customer requests, most modern applications are built through the use of events. With the growth of event-based programming, there is a larger focus on server-less platforms, such as Azure Functions (a server-less compute engine) or Azure Logic Apps (a server-less workflow orchestration engine), which enable you to spend less time worrying about any infrastructure, provisioning, and scaling, and spend more time focusing on your application.

In an attempt to make building event-based and server-less applications even easier to build on Azure, Microsoft has released Azure Event Grid, a first-of-its-kind fully managed event routing service. Azure Event Grid manages all routing of events from any source, to any destination, for any application, greatly simplifying the development of event-based applications as well as the creation of server-less workflows.

Azure Event Grid makes an event a first-class object in Azure, you can subscribe to any event that is happening across your Azure resources and react using server-less platforms like Functions or Logic Apps. In addition to the built-in publishing support for events, through services such as Blob Storage and Resource Groups, Event Grid gives users flexibility and the ability to create your own custom events to publish directly to the service. On top of having a broad array of Azure services and built-in handlers for events, like Functions, Logic Apps, and Azure Automation, Event Grid allows flexibility in handling events, supporting custom web hooks to publish events to any service, even 3rd-party services outside of Azure. The flexibility that Azure Event Grid offers allows for endless application options and makes this a truly unique service in the public cloud.

Here is how it works:

Here are some additional details of this new Azure service:

  • Events as first-class objects with intelligent filtering: 

    Azure Event Grid allows for direct event filtering using event type, prefix or suffix, so you only need to receive the events you care about. Whether you want to handle built-in Azure events, like a file being added to storage, or you want to produce your own custom events and event handlers, Event Grid enables this through the same underlying model. Thus, no matter the service or the use case, the intelligent routing and filtering capabilities apply to every event scenario and ensure that your apps can focus on the core business logic instead of worrying about routing events.

  • Built to scale:

    Azure Event Grid is designed to be highly available and to handle massive scale dynamically, ensuring consistent performance and reliability for your critical services.

  • Opens new server-less possibilities:

    By allowing server-less endpoints to react to new event sources, Azure Event Grid enables event-based scenarios to span new services with ease, increasing the possibilities for your server-less applications. Both code-focused applications in Functions and visual workflow applications in Logic Apps benefit from Azure Event Grid.

  • Lowers barriers to ops automation:

    The same unified event management interface enables simpler operational and security automation, including easier policy enforcement with built-in support for Azure Automation to react to VM creations or infrastructure changes.

Today, Azure Event Grid has built-in integration with the following services:

Event Publishers and HandlersWe are aiming to deliver more event sources and destinations later on this year, including Azure Active Directory, API Management, IoT Hub, Service Bus, Azure Data Lake Store, Azure Cosmos DB, Azure Data Factory, and Storage Queues.

Azure Event Grid completes the missing half of server-less applications. It simplifies event routing and event handling with unparalleled flexibility.

Go ahead and give it a try. I can’t wait to see what you build. To learn more try the quick start.

Contact us Today!

Chat with an expert about your business’s technology needs.