Skip to content

This site is automatic translation of, original in portuguese

Skype Meeting Broadcast – Solution for Meetings and Online Training

One of the resources released for customers who have Skype For Business is the Broadcast, that allows sessions and online events for up to 10000 people, with anonymous access, restricted, moderator and other resources in a web interface without plug-ins.

This feature works like the Webex, with questions and answers Panel, audio and video. However, as the presenter is the Skype For Business can share from a ppt to a whole desktop.

The best of it? Is a free resource for all Enterprise clients with Office 365 E1, E3, E5 or Skype For Business Plan 2!!!!

Important: you must enable the feature in your tenant, which can be done using PowerShell

How to set up a session or Event

Go to the website with your corporate account and you will have access to your calendar with upcoming events:


To create a new event, click "new meeting" and enter the required data:

  • Members: Are users that will join with the Skype For Business and can both make simultaneous presentation as act as moderators
  • Participants: Who can watch, if anonymous just repost the link generated. If it’s safe, it will be necessary to inform the list and can be external users. If you choose any company will be validated with the Azure AD
  • Video Recording: when you select this option, the meeting is recorded and is available on the portal above. However, if you choose the option "Provide." users will be able to attend the event with the link of the inscription, as a Replay


After created the scheduling is possible to show details such as link and create an invitation to be distributed:


But is the screen "Participants page settings" where we have a few interesting items:


    • Troubleshooting and support: The link appears at the meeting for users click if you have any problems. Is not interactive and a standard Microsoft page that can be replaced by a custom page
    • Custom Link: As the default link has session codes, it is possible to both shorten with specific sites like or or enter the link please, remember that will always bear the name of the tenant
    • Right or left panel application: We can choose which application will appear to users such as Yammer, Pulse or the most important of all, the questions and Answers pane.



Initiating and participating in the Session

By using the link provided, it is the custom or default, will be presented with the screen below:


When you click "Enter as a member of the team of the event" will open the Skype For Business as it is where we can use voice, video, and sharing, in addition to the chat frame which will be P & R seen by participants.

When you click to "participate in the event" the user will see the screen or content shared by the members of the team along with the response that is the most common configuration:




We have an excellent tool at hand, many today use paid services and don’t know the Office 365 plans today offer this feature free games!

References: e

Why Microsoft Azure Stack need Approved Hardware?

As is expected for all MIcrosoft IT professionals, the Azure Stack release is awaited with great anticipation. The launch was expected along with Windows 2016, but has now been postponed to the middle of next year.

Basically, the Azure Stack is the same structure of Azure, but for on-premisse environments with the new portal.

Microsoft has had this product in the past as CPS by Dell (Cloud Platform System) which was a rack of servers with System Center and Windows Azure Pack configured to provide cloud solutions "in the House".

The evolution of the product was evident, the new portal of the Azure compared to previous portal with its new features and features was what made us wait so eagerly the Azure Stack.

What has changed now?

Just as in the CPS, the Azure Stack will integrate software and hardware updates and advanced capabilities of biling, monitoring and resource balancing.

Additionally, the potential users of this type of product are businesses who need cloud models and commercial Datacenters.

Therefore, it is not possible to turn the Azure Stack on any hardware and ensure environmental criticality with 99.95% SLA is the desire for this type of environment.

One advantage of the Azure Stack on the CPS is that CPS was a Microsoft product By Dell and the Azure Stack will allow any manufacturer homologue the hardware!

This is not a change of course

Despite the Azure Stack have been publicly released, always knew he would require more hardware "heavy" and that this type of solution requires the use of approved hardware.

Everyone who already work with Datacenter solutions knows that models like the Microsoft CPS and the VCE (VMWare + Citrix + EMC) are essential to ensure that all resources of servers, storages and networking work each other without falling performance, resource loss or incompatibilities.

Anyway, the Azure Stack will be a major release and a huge evolution in Microsoft’s private cloud model, but don’t expect to run it on that server you have at home;-)

Windows Defender ATP — The New Security Product

Part of the new features of Windows 10 is the ability to drill down on security and integration with features of Microsoft DCU (Digital Crime Unit), which is the Microsoft unit that works with the Defense Department to generate and identify attacks around the world (

Types of protection Available

In general the virus are based on what are DAT files with virus signatures and can identify programs that have activities or part of these codes considered dangerous. In this category are all current antivirus, which includes Windows Defender.

Already advanced protection systems rely on internal and external behavioral analysis, that is, they identify potential threats by behaviors like some products from Symantec and McAfee, which identifies machines by sending packets to other machines, with brute force logins, etc.

Already the behavioral protection systems with external analysis are very different products. They analyze behavior of machines in the environment and external communications. With this it is possible to identify:

  • A group of machines getting packages from a particular machine with suspicious content
  • Packages from countries where the phishing attack and the like are common
  • Packages from machines already identified as "zombie"

That is, based on the analysis of the own environment and behavior of hackers, it is possible to identify certain hacker is trying to break into a company to analyze that this hacker is sending packets to the target company’s network.

What is the ATA and the ATP

Microsoft products this product is the ATA (Advanced Thread Analysis) that works in Active Directory and user logins, and ATP (Advanced Thread Protection) that works with Machine Learning (data analysis) on the logs of the individual machines.

In practice the Windows Defender ATP works with the same log that Windows Defender, but online and on the basis of the analyses and data of the DCU. With this it is possible to identify threats that are not found in traditional DAT or based only on a single machine, which is how the traditional antivirus work.

The ATA is part of the EMS (Enterprise Mobility Suite), but can be purchased part:

The ATP is still in preview with on-demand access:

Overview of ATP

As I already have access to the ATP, let’s see how it works. To request such access, enter the page above and complete with your data. You can include machines for your environment, but the system generates some machines with viruses and problems to test automatically. Note on the screens below the user used is generated by Microsoft for testing.

To get access, the first step is to indicate retention time and company profile to produce threads by thread type:


In the sequel we generate the package or the script for distribution of the settings. Note that you can create the packages for distribution by GPO, SCCM, Intune or site which is what I use in my tests:


The next step is to download the package, in my case the Script Location:


The script contains a file CMD to be executed manually in machines that wish to Defend logging is sent to the ATP. This script creates a key in the registry to indicate my tenant and activate the ATP:


From now on its machines will send data to the ATP.

In the case of my test, I can use the data of the machine that Microsoft generates tests and view alerts and dashboard. The first screen is the Dashboard indicating the General behavior in the monitored environment:


In this case I have no alerts generated in the last 30 days, but I have the tenant creation to demonstrate how to use the alert management:


Each alert can be ignored, marked as resolved or deleted in any tenant or just for this particular machine:



This type of data analysis is essential for the security of the Corporation. Soon available as a service on Azure, the ATP is a new way to analyze and ensure your environment.

Using the Azure Log Analytics (OMS) and the SCOM on Same Machine

To use the Log Analytics, former Operational Insights, together with System Center Operations Manager you can do this by SCOM itself console.

This form of integration already in March 2014:

Despite having changed the name of System Center Advisor, then for Operational Insights and Analytics Log now, the process of integration with SCOM remained the same.

But to a limitation in the SCOM integration process, because it only allows a who/Log Analytics account by organization. In many cases it is necessary to use more than one account, for example:

  • Service providers and CSC in that each client has a different account in Azure
  • When we use multiple signatures to monitor the same physical environment
  • When one of the accounts is the benefit of Visual Studio with limited credits and wish to separate the servers in different accounts

In these cases we can use the two methods the same time, install the SCOM agent and do not link to a Log Analytics account and make the process only in the desired machines.

For this, the first step is to open the Log Analytics and copy the Workspace ID and the Primary Key. See in the example below I already have my SCOM Log integrated Analytics.


The next step is to go to the machine that you want to monitor and open the SCOM monitoring agent (Microsoft Monitoring Agent):


To open the agent settings note the aba Azure Operational Insights (previous name Log Analytics). See in this print that I already have the machine being reported to the SCOM:


Enter your account details in the Log Analytics and ready, now you can have multiple accounts or individual monitoring:


Now my Active Directory data that previously were not being populated are duly completed and monitored:


Installing System Center Service Manager Authoring

In the Technical Preview version or R2 Service Manager Authoring 2012 is common cannot pass from the point below the pre-verification requirements:


Even clicking and leaving the Installer run the Visual Studio 2008 Shell, the message that he is not present continues.

To solve it is important to understand the reason. The Visual Studio Shell is not only a component, but a set. What happens is that the Service Manager Authoring doesn’t make the installation of all the components, only the Shell you need other requirements.

To resolve download the Shell, run and go to the directory created by the installer and run the VS_Shell_Isolated.enu application


See what various components will be installed and updated and why the Installer Service Manager Authoring does not complete the process of prerequisites:


After running the Shell, rerun the Service Manager Authoring and installer now spending by check!


Reinstalling DPM After Evaluation or Technical Preview

One of the common questions that I’m told is when you installed the System Center Data Protection Manager, is an evaluation version or a Technical Preview, when you try to uninstall to upgrade DPM error occurs that DPM is already present or that he is installed as evaluation.

This error happens in many cases, but the commonplace is when using a Technical Preview and uninstalling maintains the license key.

To solve the problem, just delete the license key that "left":

  1. Open the Registry Editor (RegEdit.exe)
  2. Navigate to the key HKEY_CLASSES_ROOT\Licenses
  3. Delete the key 830D982D-9ADC-4479-85CE-6474F7D00BB1

After removing the DPM license, installation occurs successfully.

Microsoft Virtual Machine Converter (MVMC) – Retirement of the product

Microsoft announced this week the withdrawal of MVMC as product later this year.

For those who don’t know or don’t remember MVMC its function, it is a plugin to convert physical machines (P2V) or other virtual platforms (V2V) for VMs in Hyper-V.

What to use in place of MVMC?

The suggestion is to use the Azure Recovery Site, but it actually is a service and it would not be useful when the desire is to climb on-push environment VMs.

However, in the case of the client that wants to transform the physical environment (P2V) for cloud (IaaS) Azure Recovery Site is the best option.

And for those who need to do V2V hosted on VMWare to Hyper-V can use VMM (System Center Virtual Machine Manager) that processes the conversion natively.

Finally, for cases of physical-to-virtual machine conversion (P2V) you can use Disk2VHD as already commented on other occasions and is a very well-known product to generate VHDs from physical disks, which I discussed in 2009: (pt-BR)

Link of Disk2VHD: