Search This Blog

Monday, February 27, 2017

How to find Azure VM resource limits

By default Azure sets limits to how much resources (for example, CPU cores) VMs can consume in specific Azure region. To see the limits and and resource consumption use this Powershell command:

Get-AzureRmVMUsage -Location "West Europe"

(I am using "West Europe" region, but specify the one that's relevant to you)

Preview version of Azure Portal

To get an insight of features coming to Azure Portal, log on to will be able to see all coming features which are not yet available to production Azure Portal.

Saturday, February 18, 2017

SOLVED: SCCM "Turn on" pre-release feature button is greyed out

If you want to turn on a SCCM pre-release feature, but go to SCCM console to Administration - Overview - Cloud Services - Updates and Servicing and find that it is greyd out, then you first have to consent to using pre-release features.

To do that, go to Administration - Overview - Site Configuration - Sites - select your site - Hierarchy Settings and in the General tab click "Consent to use Pre-Release features"

After that you will be able to activate pre-release features:

Saturday, February 11, 2017

Step-by-step: How to inventory OS architecture with SCCM

Here is an easy way how to inventory OS architecture with SCCM.

1. Extend inventory. In SCCM console go to Administration - Client Settings - Default Client settings (or your custom settings) - Properties - Hardware Inventory - Set Classes - search for 'operating system' - select 'OS architecture'

2. Make sure that this client settings object is deployed to computers. If you are using Default Client Settings, then no action needs to be done.

3. Wait for machine policy renewal and hardware inventory cycle afterwards on client.

4. Create a query:

select SMS_R_System.Name, SMS_G_System_OPERATING_SYSTEM.Caption, SMS_G_System_OPERATING_SYSTEM.OSArchitecture from  SMS_R_System inner join SMS_G_System_OPERATING_SYSTEM on SMS_G_System_OPERATING_SYSTEM.ResourceId = SMS_R_System.ResourceId

5. You will get following results:

Thursday, February 9, 2017

SHA1 thumbprint algorithm in certificates - is it secure?

Many of you have heard that SHA1 algorithm is not secure as certificate signing algorithm anymore. It is considered so insecure, that operating systems, and browsers consider certificates signed with SHA1 not secure and show warning messages.
But what about thumbprint algorithm, is it okay that it is SHA1?

No worries there, this really is not a security hole, as thumbprint is used to identify certificates more easily. For example, you have a web server and have to add a certificate to ensure HTTPS encryption. Web server offers to choose certificates from local store, but there are few certificates with equal subject name. And this is where you use certificate thumbprint - to choose correct certificate.
Also, to my knowledge, there is no way to change thumbprint algorithm.