A session on how to modernise and cloud-integrate traditional files servers using Azure File Sync. The solution will introduce ransomware-resistant backup, disaster recovery, multi-location cloud sync, and tiered storage.
Azure Networking - The First Technical ChallengeAidan Finn
The first "technical" obstacle for many organisations in Azure adoption is often the design of a secure and accessible network or landing zone for workloads and data.
Integrating security into the application development processJerod Brennen
The document provides an overview of integrating security into the application development process. It discusses seeking to understand development methodologies, programming languages, and risk frameworks. It also covers source code security best practices like code reviews and tools. Application security and software quality assurance testing methods are reviewed. The document also discusses analyzing deployed applications and other considerations like training and metrics. Resources for further learning are provided.
Delivering and optimizing citrix from microsoft azure Marius Sandbu
This document provides an agenda and overview of delivering and optimizing Citrix from Microsoft Azure. It discusses basic building blocks in Azure, identity options, networking considerations, high availability services, provisioning with Machine Creation Services (MCS), automation and monitoring options. Example architectures, tips and tuning, and scripts for automation are also included on the agenda.
The document provides an agenda and summary for a Citrix User Group Community webinar on the state of End User Computing (EUC) in 2021. The agenda covers topics like ransomware threats from a VDI perspective, Zero-Trust security models, Secure Access Service Edge (SASE), modern workplace authentication, analytics from Citrix and VMware, updates from Microsoft, Citrix and VMware on virtual desktop infrastructure and cloud platforms, and the future of EUC. The presenters are introduced and instructions are given to submit questions and complete a survey.
Enter The Matrix Securing Azure’s AssetsBizTalk360
This talk is mainly on the security aspects of Azure, in any context. you’ll get an overview on where security is handled, some practices and how to monitor and act accordingly to certain threats and issues. It will focus on IaaS, PaaS and SaaS. As security is an integral part of an environment, the integration aspect is not far away. Focus products include Azure and all related services.
This document discusses designing secure Azure networks. It begins with an overview of basic virtual network (VNET) components like resource groups and network security groups. Various hybrid connection options are presented such as VNET peering, VPN, and ExpressRoute. Demos show how to apply network security groups and configure VNET peering. The importance of security in design is emphasized through recommendations to assume breach, use network components like NSGs and NVAs, and leverage Security Center.
Microsoft Azure Hybrid Cloud - Getting Started For TechiesAidan Finn
This is my "getting started for techies" presentation on using the Microsoft Azure public cloud to build hybrid cloud solutions in conjunction with Windows Server 2012 R2 Hyper-V and System Center.
Windows Azure Security Features And Functionalityvivekbhat
Windows Azure is a cloud computing platform that combines compute, storage, and SQL components. It handles threats to its infrastructure like physical attacks and impersonation, while customers are responsible for threats to their tenant like code bugs and privilege abuse by their own administrators. Windows Azure provides security features like network access control, hypervisor isolation of tenants, access controls on storage accounts, and password authentication for SQL databases.
This document discusses using Microsoft Enterprise Mobility Suite (EMS) with Citrix in an Azure environment. It provides an architecture overview including Azure AD, Intune, Citrix XenDesktop/XenApp, NetScaler, and other components. It describes how Intune can deploy Citrix Receiver and VPN profiles, how Azure AD handles authentication to Citrix using SAML, and how NetScaler and Storefront are configured for single sign-on. Conditional access policies, monitoring with Log Analytics, and other considerations are also covered at a high level.
The value of containers is widely touted, but running them securely at scale and in long lived production environments presents new challenges. Amazon EC2 Container Service (ECS) changes the game by delivering cluster management and scheduling as a service. In this talk we’ll present how Okta uses ECS for parallelized testing in CI and for production microservices in a multi-region, always on cloud service. Learn why we chose ECS and many of the tips and tricks for securing, scaling and managing cost.
CCI2018 - Azure Network - Security Best Practiceswalk2talk srl
Francesco Molfese presented on Azure network security best practices. He discussed how to use Azure networking services like virtual networks, network security groups, application security groups, service endpoints, Azure Firewall, and DDoS protection to implement a zero trust network model. A hub-spoke topology with services in the hub and workloads in the spokes provides segmentation and security. Monitoring, logging, and alerts from services like Network Watcher and Azure Monitor help provide visibility and protection. The presentation provided demos and recommendations on configuring these services to securely network Azure resources.
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
Venom vulnerability Overview and a basic demoAkash Mahajan
This vulnerability, called VENOM, allows an attacker to escape from a virtual machine guest into the host system. It affects virtualization platforms that use Xen, Qemu, KVM, or VirtualBox as their hypervisor. The vulnerability is in the virtual floppy disk controller code, which contains a buffer overflow issue. This allows an attacker to potentially gain code execution on the host machine. It is a serious issue because many cloud providers use these vulnerable virtualization platforms.
Azure WAF is a cloud-native web application firewall service that provides powerful protection for web apps with simple deployment, low maintenance costs, and automatic updates. It acts as a content delivery network and can defend against common attacks like command execution, SQL injection, cross-site scripting, and more, as demonstrated in a presentation where custom rules were set up to create an Azure WAF.
This document provides examples of hybrid cloud architectures and scenarios. It describes using a hybrid cloud approach for encrypted backups, replication between two sites, orchestrated recovery in the event of an outage, and remote access through a VPN. Specific solutions mentioned include System Center, Hyper-V, StorSimple, and Azure. The document also discusses migration strategies for different types of servers and applications to a hybrid cloud model.
Azure News Slides for October2017 - Azure Nights User GroupMichael Frank
James Rooke presented on Azure Stack at Microsoft HQ in Melbourne. The presentation included an overview of recent Azure announcements, a deep dive session on Azure Stack, and a meet the team segment. Key announcements included the general availability of the Azure Managed Applications service, PowerShell support in Azure Cloud Shell, and new features for Azure services like SQL Database, Stream Analytics, and Machine Learning.
This document discusses Azure networking features such as virtual networks, subnets, private and public IP addresses, load balancing, network security groups, routing, virtual network peering, and secure network designs. It provides an overview of these concepts with examples and considerations for using Azure networking components to design secure network architectures in Azure.
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...DevClub_lv
Erwin Staal from 4DotNet will share experience on “Network security with Azure PaaS services“.
He will share some of the things he learned while implementing network security at his current client. We will start with a short introduction to the basics of networking in Azure. He will present to you some best practices and tell you about some of the limitations you need to know before getting started. We will talk about how you for example can lock-down your API or SQL-server. To do that we will use relatively new Azure offerings like Service endpoints, Private endpoints, and VPN connections.
Erwin is a .NET Software Engineer and DevOps Consultant at 4DotNet. He’s helping clients with ASP.NET Core, Docker and Kubernetes and as a DevOps Consultant he helps companies with the implementation of DevOps and Continuous Delivery.
IBM & HCL partnership on Informix. Informix 12.10.xC9 and xC8 feature highlights. Slides from "Jump Start with the enhanced Informix" webcast on 13 July, 2017
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...RightScale
Your database is the foundation of your application. With cloud comes new advantages and considerations for architecting and deployment. Find out how RightScale uses SQL and NoSQL databases such as MySQL, MongoDB, and Cassandra to provide a scalable, distributed, and highly available service around the globe.
Password Policies in Oracle Access Manager. How to improve user authenticatio...Andrejs Prokopjevs
This presentation is about how System Administrators and/or Oracle Apps DBAs can improve and meet user authentication security standards in Oracle E-Business Suite by using Oracle Access Manager integration and it's password policy management.
We will talk about:
- Current Oracle E-Business Suite password security limitations.
- Implementation of password policy management in Oracle Access Manager releases. Comparing the capabilities and why you should upgrade your OAM to the latest 11gR2.
- A use case example of most common configuration.
- Demo.
This document provides an overview of Module 10 which covers implementing file and print services in Microsoft Official Course. It includes lessons on securing files and folders with NTFS permissions, protecting shared files using shadow copies, configuring work folders, and configuring network printing. The module aims to help students secure files and folders, enable offline access to work files, and simplify printer management. It contains demonstrations and a lab exercise for hands-on practice of these topics.
Mihail Mateev gave a presentation introducing the Azure File service. The Azure File service allows the use of Azure storage as file shares that can be accessed via SMB from virtual machines using standard file I/O APIs. It provides a way to share persistent data between servers or applications without needing local file servers. The presentation covered how to create and manage file shares using PowerShell and .NET, and when each Azure storage option - Files, Blobs, and Data Disks - would be appropriate.
This document discusses managing storage across public and private resources. It covers the evolution of on-site storage management, storage options in the public cloud, and challenges of managing hybrid cloud storage. Key topics include the transition from siloed storage to software-defined storage, various cloud storage services like object storage and block storage, challenges of public cloud limitations, and solutions for connecting on-site and cloud storage like gateways, file systems, and caching appliances.
This document provides an overview of implementing business continuity and disaster recovery through data protection strategies. It discusses identifying recovery requirements, service level agreements, enterprise data protection strategies, mitigation strategies, and best practices. It also covers implementing Windows Server Backup, including backup types, technologies, capacity and security planning, configuration, and restoration of files and servers. Considerations for enterprise backup solutions and Data Protection Manager are also reviewed.
This document outlines a plan to migrate a small business server (SBS) environment to Office 365 and Azure. The plan involves: 1) evaluating the current SBS environment; 2) enabling Office 365 and Azure subscriptions; 3) implementing Azure file and application backups; 4) migrating email, files, and company data to Office 365 and Azure services in stages; and 5) extending the environment using additional Azure and Office 365 capabilities once the migration is complete. Resources and best practices are provided to help successfully execute the plan.
Module 13: Recovering Network Data and Servers
This module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.
Lessons
Recovering Network Data with Volume Shadow Copies
Recovering Network Data and Servers with Windows Server Backup
Lab : Recovering Network Data and Servers
Configuring Shadow Copies
Configuring a Scheduled Backup
After completing this module, students will be able to:
Describe how to configure and use volume shadow copies.
Describe how to configure and use Windows Server Backup.
This document discusses using Microsoft Enterprise Mobility Suite (EMS) with Citrix in an Azure environment. It provides an architecture overview including Azure AD, Intune, Citrix XenDesktop/XenApp, NetScaler, and other components. It describes how Intune can deploy Citrix Receiver and VPN profiles, how Azure AD handles authentication to Citrix using SAML, and how NetScaler and Storefront are configured for single sign-on. Conditional access policies, monitoring with Log Analytics, and other considerations are also covered at a high level.
The value of containers is widely touted, but running them securely at scale and in long lived production environments presents new challenges. Amazon EC2 Container Service (ECS) changes the game by delivering cluster management and scheduling as a service. In this talk we’ll present how Okta uses ECS for parallelized testing in CI and for production microservices in a multi-region, always on cloud service. Learn why we chose ECS and many of the tips and tricks for securing, scaling and managing cost.
CCI2018 - Azure Network - Security Best Practiceswalk2talk srl
Francesco Molfese presented on Azure network security best practices. He discussed how to use Azure networking services like virtual networks, network security groups, application security groups, service endpoints, Azure Firewall, and DDoS protection to implement a zero trust network model. A hub-spoke topology with services in the hub and workloads in the spokes provides segmentation and security. Monitoring, logging, and alerts from services like Network Watcher and Azure Monitor help provide visibility and protection. The presentation provided demos and recommendations on configuring these services to securely network Azure resources.
This document provides an overview of Microsoft Azure security features, including:
- Shared responsibility model where Microsoft secures the platform and customers secure their data and applications
- Identity and access management, encryption of data at rest and in transit, network security controls, and logging/monitoring capabilities
- Security Center provides visibility into threats and advanced analytics to detect attacks
- Operations Management Suite allows collecting logs from Azure, on-premises, and other clouds to analyze security events
- Microsoft works with partners to provide additional virtual network appliances and security solutions to customers
Venom vulnerability Overview and a basic demoAkash Mahajan
This vulnerability, called VENOM, allows an attacker to escape from a virtual machine guest into the host system. It affects virtualization platforms that use Xen, Qemu, KVM, or VirtualBox as their hypervisor. The vulnerability is in the virtual floppy disk controller code, which contains a buffer overflow issue. This allows an attacker to potentially gain code execution on the host machine. It is a serious issue because many cloud providers use these vulnerable virtualization platforms.
Azure WAF is a cloud-native web application firewall service that provides powerful protection for web apps with simple deployment, low maintenance costs, and automatic updates. It acts as a content delivery network and can defend against common attacks like command execution, SQL injection, cross-site scripting, and more, as demonstrated in a presentation where custom rules were set up to create an Azure WAF.
This document provides examples of hybrid cloud architectures and scenarios. It describes using a hybrid cloud approach for encrypted backups, replication between two sites, orchestrated recovery in the event of an outage, and remote access through a VPN. Specific solutions mentioned include System Center, Hyper-V, StorSimple, and Azure. The document also discusses migration strategies for different types of servers and applications to a hybrid cloud model.
Azure News Slides for October2017 - Azure Nights User GroupMichael Frank
James Rooke presented on Azure Stack at Microsoft HQ in Melbourne. The presentation included an overview of recent Azure announcements, a deep dive session on Azure Stack, and a meet the team segment. Key announcements included the general availability of the Azure Managed Applications service, PowerShell support in Azure Cloud Shell, and new features for Azure services like SQL Database, Stream Analytics, and Machine Learning.
This document discusses Azure networking features such as virtual networks, subnets, private and public IP addresses, load balancing, network security groups, routing, virtual network peering, and secure network designs. It provides an overview of these concepts with examples and considerations for using Azure networking components to design secure network architectures in Azure.
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...DevClub_lv
Erwin Staal from 4DotNet will share experience on “Network security with Azure PaaS services“.
He will share some of the things he learned while implementing network security at his current client. We will start with a short introduction to the basics of networking in Azure. He will present to you some best practices and tell you about some of the limitations you need to know before getting started. We will talk about how you for example can lock-down your API or SQL-server. To do that we will use relatively new Azure offerings like Service endpoints, Private endpoints, and VPN connections.
Erwin is a .NET Software Engineer and DevOps Consultant at 4DotNet. He’s helping clients with ASP.NET Core, Docker and Kubernetes and as a DevOps Consultant he helps companies with the implementation of DevOps and Continuous Delivery.
IBM & HCL partnership on Informix. Informix 12.10.xC9 and xC8 feature highlights. Slides from "Jump Start with the enhanced Informix" webcast on 13 July, 2017
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...RightScale
Your database is the foundation of your application. With cloud comes new advantages and considerations for architecting and deployment. Find out how RightScale uses SQL and NoSQL databases such as MySQL, MongoDB, and Cassandra to provide a scalable, distributed, and highly available service around the globe.
Password Policies in Oracle Access Manager. How to improve user authenticatio...Andrejs Prokopjevs
This presentation is about how System Administrators and/or Oracle Apps DBAs can improve and meet user authentication security standards in Oracle E-Business Suite by using Oracle Access Manager integration and it's password policy management.
We will talk about:
- Current Oracle E-Business Suite password security limitations.
- Implementation of password policy management in Oracle Access Manager releases. Comparing the capabilities and why you should upgrade your OAM to the latest 11gR2.
- A use case example of most common configuration.
- Demo.
This document provides an overview of Module 10 which covers implementing file and print services in Microsoft Official Course. It includes lessons on securing files and folders with NTFS permissions, protecting shared files using shadow copies, configuring work folders, and configuring network printing. The module aims to help students secure files and folders, enable offline access to work files, and simplify printer management. It contains demonstrations and a lab exercise for hands-on practice of these topics.
Mihail Mateev gave a presentation introducing the Azure File service. The Azure File service allows the use of Azure storage as file shares that can be accessed via SMB from virtual machines using standard file I/O APIs. It provides a way to share persistent data between servers or applications without needing local file servers. The presentation covered how to create and manage file shares using PowerShell and .NET, and when each Azure storage option - Files, Blobs, and Data Disks - would be appropriate.
This document discusses managing storage across public and private resources. It covers the evolution of on-site storage management, storage options in the public cloud, and challenges of managing hybrid cloud storage. Key topics include the transition from siloed storage to software-defined storage, various cloud storage services like object storage and block storage, challenges of public cloud limitations, and solutions for connecting on-site and cloud storage like gateways, file systems, and caching appliances.
This document provides an overview of implementing business continuity and disaster recovery through data protection strategies. It discusses identifying recovery requirements, service level agreements, enterprise data protection strategies, mitigation strategies, and best practices. It also covers implementing Windows Server Backup, including backup types, technologies, capacity and security planning, configuration, and restoration of files and servers. Considerations for enterprise backup solutions and Data Protection Manager are also reviewed.
This document outlines a plan to migrate a small business server (SBS) environment to Office 365 and Azure. The plan involves: 1) evaluating the current SBS environment; 2) enabling Office 365 and Azure subscriptions; 3) implementing Azure file and application backups; 4) migrating email, files, and company data to Office 365 and Azure services in stages; and 5) extending the environment using additional Azure and Office 365 capabilities once the migration is complete. Resources and best practices are provided to help successfully execute the plan.
Module 13: Recovering Network Data and Servers
This module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.
Lessons
Recovering Network Data with Volume Shadow Copies
Recovering Network Data and Servers with Windows Server Backup
Lab : Recovering Network Data and Servers
Configuring Shadow Copies
Configuring a Scheduled Backup
After completing this module, students will be able to:
Describe how to configure and use volume shadow copies.
Describe how to configure and use Windows Server Backup.
Cloud computing UNIT 2.1 presentation inRahulBhole12
Cloud storage allows users to store files online through cloud storage providers like Apple iCloud, Dropbox, Google Drive, Amazon Cloud Drive, and Microsoft SkyDrive. These providers offer various amounts of free storage and options to purchase additional storage. They allow files to be securely uploaded, accessed, and synced across devices. The best cloud storage provider depends on individual needs and preferences regarding storage space requirements and features offered.
Looking at remote data replication, including possible scenarios and how it compares to syncing information. This slide deck also covers how data replication happens across various operating systems and how to use HotFolder to HotFolder replication.
Azure Resource Manager (ARM) templates allow you to define Azure infrastructure as code using declarative syntax. ARM templates describe the desired state of resources and ARM handles provisioning and managing resources to match that state. Key benefits of ARM templates include repeatable and consistent deployments, declarative syntax that removes complex deployment scripts, and built-in dependency handling. Microsoft also introduced a new ARM template language called Azure Bicep that uses declarative syntax to define Azure resources and deployments.
CloudBerry Backup 5.7 includes several new features such as support for hybrid backups to local and cloud storage in one pass, restoring image-based backups directly to Google Compute Engine virtual machines, restoring backups as VMware virtual machines, and faster NTFS file scanning. It also adds support for the Azure Archive storage tier and Wasabi cloud storage. The updated product provides all-inclusive support for hybrid backups, faster restores of images to GCP and VMware, and uses the Backup Operators API for more secure local backups.
- Big Green IT is a Microsoft Gold Partner that provides Azure Backup and Azure Site Recovery services.
- Azure Backup allows backing up of physical servers, virtual machines, files/folders to Azure using the Azure Backup agent, Azure Backup server, or native Azure VM backup.
- Azure Site Recovery allows replication and disaster recovery of on-premises and Azure VMs to Azure.
Using Microsoft Azure as cloud file serverjimliddle
Using Microsoft Azure for a Cloud File Server allows companies to:
- Replace Dropbox with a solution that adds control, audit, and governance capabilities when using single or multiple clouds.
- Turn single or multiple clouds into a cloud file server that can be accessed via a hosted service or delivered on-premise.
- Customize the file server experience with branding, user management, sharing options, encryption, notifications, and auditing.
- Provide a rich set of features for file management, sharing internally and externally, searching, and syncing files across desktop and mobile clients.
Slides from CIAOPS MAy 2018 webinar that provided Azure news update, open Q & A as well as a focus session on Azure storage. Video recording is available at www.ciaopsacademy.com
The document discusses whether OneDrive is enterprise ready. It provides an overview of OneDrive architecture and features, including how it differs from previous sync clients like Groove. It also covers OneDrive administration options through Group Policy, Intune and the SharePoint admin center. The document recommends reading Microsoft blogs and roadmaps to stay updated on OneDrive capabilities and limitations for enterprise use.
This webinar previewed FileCatalyst 3.5's new integration with Amazon S3. It demonstrated how FileCatalyst can now treat S3 storage as a file system, allowing files to be streamed directly to S3 without first being cached locally. This is done through Java NIO.2 and Amazon's SDK. The webinar showed a demo and discussed how S3 buckets/folders can be integrated and accessed, as well as ways to connect and improve performance, such as using enhanced networking on certain EC2 instance types. Future plans include finalizing performance optimization and integrating additional file systems and object stores.
This document discusses distributed file systems. It describes distributed file systems as implementing a common file system that can be shared across autonomous computers. A client-server model is presented where file servers store files and clients access them. Key services like name servers and caching are described. Design issues around naming, caching, writing policies, availability, scalability, and semantics are also summarized.
Deploying PHP applications on the cloud can be a tricky task, especially when it comes to automation and clustered environments that scale up and down. If you’re looking for ways to improve or automate your code deployment methods and use continuous integration and delivery, this session is for you.
Trust No-One Architecture For Services And DataAidan Finn
This document discusses implementing a "trust no-one" architecture for services and data in cloud environments. It recommends micro-segmenting networks into secure zones, limiting public IP addresses, controlling network edges with firewalls and routing, implementing security measures like NSGs at multiple depths, and logging and monitoring traffic with Azure Security Center and Sentinel. The goal is to break from common practices of open internal networks and implement layered security everywhere using features like private endpoints, firewalls, and logging.
Windows Server 2012 R2 Software-Defined StorageAidan Finn
In this presentation I taught attendees how to build a Scale-Out File Server (SOFS) using Windows Server 2012 R2, JBODs, Storage Spaces, Failover Clustering, and SMB 3.0 Networking, suitable for storing application data such as Hyper-V and SQL Server.
This is a presentation based on the 2012 R2 generation of the Microsoft Cloud OS, including Microsoft Azure, Windows Server 2012 R2, Hyper-V, and System Center 2012 R2. It spans Microsoft public cloud IaaS, partner operated public cloud, and private cloud.
This is my 75 minutes "highlights" presentation on what's new in WS2012 R2. It's not all encompassing - intended just to get across the key points of the core OS. It followed a "Cloud OS" keynote and preceded a "System Center hybrid cloud" presentation.
E2EVC Copenhagen What’s New With Microsoft VirtualizationAidan Finn
Aidan Finn is a technical sales lead who has worked in IT since 1996. He is an MVP for virtual machines and publishes books on topics like Windows Server, Hyper-V, and System Center.
Microsoft released many new products and features in 2012, including Windows 8, Windows Server 2012, Hyper-V, and System Center 2012. Key new capabilities included 64 vCPUs and 1TB RAM per virtual machine, live migration options, and Storage Spaces.
The System Center suite provides a complete private or hybrid cloud solution with capabilities for virtual machine management, monitoring, backup, automation, and more through a single product. This allows IT to deliver services to the business easily while abstracting the underlying infrastructure.
Windows Server 2012 introduces new storage features including the iSCSI Target role service, Storage Spaces, deduplication, and improvements to SMB 3.0. Storage Spaces allows the aggregation of disks into storage pools from which virtual disks can be created using mirroring or parity. Deduplication reduces the storage space used by identifying and removing duplicate data blocks. SMB 3.0 in Windows Server 2012 provides faster file sharing capabilities that can match or exceed block-level protocols like iSCSI.
This is the deck that I used at the January 2012 Hyper-V.nu event in Amsterdam, Netherlands. It focuses on the Build announced details on Windows Server 8 Hyper-V networking.
Private Cloud Academy: Backup and DPM 2010Aidan Finn
The session I ran on how to design CSV for Hyper-V backups, and how to use DPM 2010, at the Microsoft/System Dynamics Private Cloud Academy in Dublin, Ireland.
This document summarizes updates to Windows Server 2008 R2 Hyper-V since its initial release. It discusses new features like the Hyper-V Monitor gadget, PRO Tips management packs, Best Practices Analyzer, integration with maintenance mode, and Linux support improvements. It also advertises the author's upcoming book "Mastering Hyper-V Deployment" and encourages questions.
This document provides a summary of a presentation on Windows Server 2008 R2 Hyper-V best practices. It covers topics such as assessing existing infrastructure, designing virtual machines and hosts, deploying Hyper-V and VMM, integrating with OpsMgr, and backing up with DPM 2010. The presentation emphasizes the importance of requirements gathering, server sizing, storage design, and following application vendor guidance. It also promotes clustered hosting and the use of tools like MAP, VMM, and OpsMgr for management.
Windows Deployment Tools And MethodologiesAidan Finn
This document discusses tools and methodologies for deploying Windows, including Windows 7. It summarizes Windows Automated Installation Kit (WAIK) for creating unattended installs, Windows Deployment Services (WDS) for network-based imaging, and Microsoft Deployment Toolkit (MDT) 2010 for task-based imaging and deployment. It also demonstrates how to use these tools together to deploy Windows 7 through unattended installs, imaging, and integrating with System Center Configuration Manager for automated, reporting-based deployments.
What's New In 2008 R2 Hyper V and VMM 2008 R2 - Updated Oct 2009Aidan Finn
This document summarizes new features in Hyper-V 2008 R2 and VMM 2008 R2, including increased host limits, live migration, core parking, second level address translation, virtual machine queue, native VHD, and enhanced management capabilities in VMM 2008 R2 such as support for live migration and cluster-to-cluster migration. It also discusses upgrades from previous versions and tools for developers.
Whats New In 2008 R2 Hyper V And Vmm 2008 R2Aidan Finn
This document summarizes new features in Hyper-V 2008 R2 and VMM 2008 R2, including support for more virtual processors and VMs per host, clustered shared volumes for easier VM migration, live migration capabilities, core parking for improved resource utilization, second level address translation for performance gains, and the virtual machine queue for network improvements. It also discusses upgrades to VMM 2008 R2, including support for live migration and improved storage and network functionality.
1. Copy memory pages from the source virtual machine to the target virtual machine via Ethernet.
2. Pause the source virtual machine, move its storage connectivity to the target host over Ethernet, and run the virtual machine on the target host.
3. Delete the virtual machine from the source host after completing the migration.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
TrsLabs - Fintech Product & Business ConsultingTrs Labs
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just tools—they're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Digitally Transform (And Keep) Your On-Premises File Servers
1. Digitally Transform (And Keep) Your
On-Premises File Servers
Aidan Finn
Azure MVP, Ireland
Principal Consultant, Innofactor Norway
Owner, Cloud Mechanix
2. About Aidan Finn
https://aidanfinn.com
@joe_elway
13 Year MVP
Azure, previously Hyper-V and
SCCM
Principal Consultant, Innofactor
Norway
https://innofactor.com
Owner, Cloud Mechanix –
http://cloudmechanix.com
Azure training around Europe
Next Class – ONLINE July 30th
“Securing Azure Services & Data Through
Azure Networking””
https://july302020.cloudmechanix.com/
4. You’ve Moved to SharePoint Online – Right?
• It’s easy to migrate to SharePoint Online
• Not so quick there, jack-aroo!
• Everyone’s collaborating in the cloud
• We’d love to
• And all the file servers are gone
• Hmm … we need to talk
5. The File Server Plays a Critical Role
• Everywhere from small to large business
• Branch offices
• Because:
• Low client <> server latency
• They’re familiar
• You’ve got a continuing investment
• There are dependencies
• Sometimes the cloud offerings just aren’t (completely)
suitable
7. What If We Make the File Server Better?
• Synchronize through the cloud
• A “master” cloud replica
• Built on mature, mission critical, technology
• Reduce on-premises storage needs
• Without the users/applications noticing
• Permissions stay the same
• Move backup to the cloud
• Less on-premises infrastructure
• Automatic off-site backups
• Enable disaster recovery
• Recover in minutes
9. Azure File Sync (AFS)
• Synchronize through the cloud
• A “master” cloud replica in Azure Files (General Purpose Storage account)
• Built on Microsoft Sync Framework (7+ years in SQL Server)
• Reduce on-premises storage needs
• Cloud tiering, replacing files with reparse points (pointers)
• Permissions stay the same
• Move backup to the cloud
• Back done in the cloud
• Automatic off-site backups
• Enable disaster recovery
• Restore files/complete shares in minutes
• Creates reparse points on the new file server
10. Isn’t That StorSimple?
• StorSimple:
• Available as PAYG virtual appliance or expensive physical appliance
• Supports iSCSI/SMB LUNs
• Does all the above
• Major differences:
• StorSimple is block based / AFS is file based
• StorSimple is generic / AFS is specific to file servers
• StorSimple uses Azure blob storage / AFS uses Azure Files storage
• You must move data ON TO StorSimple / You put an AFS agent onto existing file
server
• When to use?
• AFS is for file servers
• You can migrate from StorSimple to AFS
• Contact [email protected]
14. File Server Requirements
• OS:
• Windows Server 2012 R2 Full/Core
• Windows Server 2016 Full/Core
• Windows Server 2019 Full/Core
• RAM: 2GB or more
• Required for the StorageSync filter driver
• Ensure Hyper-V Dynamic Memory is set to 2GB Startup & Minimum
• Latest edition of Azure RM (until Dec 2020) or Az PowerShell modules
• Supports
• Traditional active/passive file server clusters
• DFS Namespace
• Anti-virus that respects the FILE_ATTRIBUTE_RECALL_ON_DATA_ACCESS attribute of cloud-tiered
files
15. Known Compatible AV Products
• Windows Defender
• System Center Endpoint Protection (SCEP)
• Test Third-Party AV:
• Azure File Sync Antivirus Compatibility Test Suite
• Check respect of
FILE_ATTRIBUTE_RECALL_ON_DATA_ACCESS attribute
Issue with MS AV products: https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-planning#azure-file-sync-system-requirements-and-
interoperability
16. Encryption
• OK:
• BitLocker & similar disk-level encryption
• Azure Information Protection
• AD Rights Management Services
• File-level encryption
• Incompatible:
• EFS
• File system encryption
File
File System
Disk
17. Admin Interface
• Azure Portal
• Windows Admin Center
• V2.0 of AFS extension announced at Microsoft Ignite 2019
• PowerShell
18. Deploy The Azure Components
1. Create a Storage Sync Service
• In a region close to the on-premises file server(s)
• Reduce latency when retrieving cold/restored files
2. Create a storage account with Azure Files support
• Cannot use Blob/Tiering because AFS uses Azure Files shares
• GPv1, GPv2 or Premium Files
• GRS for Azure region disaster recovery
• Same region as the Storage Sync Service
3. Create a DELETE lock for the storage account
• Prevents accidental deletion of the storage account – not the
contents
• You’ll see why later (backups)
19. Azure File Shares
• Intended for system access
• For example, migrated legacy apps, Azure File Sync
• Not good for direct end user access
• Scalability
• 5 Tib 100 TiB per share *
• Depends on region and selected resiliency level
• 10k IOPS per Standard share
• 100k IOPS per Premium share
• 1 4 TiB max file size
• 100M items per share
• 5M items per directory
* https://docs.microsoft.com/en-us/azure/storage/files/storage-files-planning#regional-availability
20. Install the Storage Sync Service
1. Install the Azure RM or Az PowerShell modules on the file server
• “Latest released” version from GitHub
• Will require a reboot for new installations
2. Download the File Sync Agent from the Storage Sync Service
3. Install the File Sync Agent on the file server
• Choose if/when scheduled updates occur
4. Register with the Storage Sync Service
• Requires Azure credentials
• Set IE Enhanced Configuration == Off
• CSP subscriptions require a toggle to be set
• The file server appears as a registered server in Storage Sync Service
22. The Pieces of Folder Synchronisation
• Server endpoint:
• A folder that is synchronised to Azure
• Storage account
• Provides the Azure Files service
• Cloud endpoint:
• An Azure Files share that is the cloud replica
• Sync group:
• Comprised of 1 cloud endpoint & 1+ server endpoints
• Many file servers can synchronise a single folder
• Replicates all files into Azure from the server endpoints
• Subject to allowed files
• Replicates all files to the server endpoints
23. Replication
• Remember:
• Everything in a server endpoint is replicated to Azure
• The Azure Files share becomes the master copy
• The file server is now a local hot-cache
• You can browse Azure Files shares:
• SMB connection: Requires authentication, doesn’t apply NTFS
permissions
• Azure Portal: Via storage account > Files
• Azure Storage Explorer: Free GUI tool
• Modifications on the file server are replicated to Azure ASAP
• Modifications in the cloud can take time to appear on prem
• Low priority task
24. Creating a Sync Group
1. Create a share in Azure Files
• Name has nothing to do with on-prem folder name
2. Create a Sync Group
• Name has nothing to do with on-prem folder name
3. Add a server endpoint
• Select the registered file server
• Enter the path
• Optionally enable cloud tiering (more later)
25. Adding a New File Server
• Extending replication from Server1 to Server2 via Azure
• Process:
1. Install the File Sync Agent on the file server & register it
2. Add a new server endpoint
3. The on-prem folder path/name on Server2 doesn’t need to match
Server1
4. The folder and files (reparse points) appear in minutes
27. Saving Space on File Servers
• Cloud tiering is powered by a filter driver called StorageSync
• Tracks the temperature (usage) of files
• When enabled, it moves converts the coldest local replica files into reparse points
• A pointer to the cloud-replica of the file
• Additional attribute is associated with the file
• A = archive/synchronised
• P = Sparse
• L = Reparse point
• O = Offline
• Icon of the file changes
• File path/name/permissions do not change
• The file is downloaded from the cloud on demand – remember it is cold because it
is rarely (if ever) used
28. How Tiering Works
• Configured per server endpoint:
• D:SharesAccounting on Server1 has a tiering policy
• F:LocalSharesAccounting on Server2 has a different tiering policy
• G:Accounting on Server3 has no tiering policy
• A tiering policy:
• Enabled/Disabled
• Specifies what percentage of the volume should be free
• Date range – what age (days) files are tiered
29. Tiering – Overlapping Percentages
• All tiering policies on a single volume are based on largest free space wins:
• D:SharesAccounting = 10%
• D:SharesManagement = 20%
• D:OtherFolder = 30%
Tiering will try to clear up 30% from the volume from the tiered folders
30. Tiering – Overlapping Policy Types
• All tiering policies on a single volume are based on largest free space wins:
• 30% free space
• Local retention = 30 days
• The volume is full
The free space policy will always win
Tiering will try to clear up 30% despite the age of hot files
31. Tiering Requirements
• Must be a data volume – not the OS drive
• A file must be 64 KiB+ to be eligible for cloud-tiering
• Cloud tiering is incompatible with Windows Server deduplication
• Cloud-tiered files will not be indexed by Windows Search
• Remember the 2 GiB RAM requirement for the Azure File Sync agent
• StorageSync filter driver will fail to work if it cannot get enough RAM
• You need some free space on the data volume
• How much – unknown at this time
33. How Azure Backup Works With AFS
• Today:
• Azure Backup is only an orchestrator
• No data stored in the Recovery Services Vault
• Generally Available
• What happens:
• Incremental snapshots of shares in the storage account
• Max 200 snapshots per share
• Does not consume from the limit of an Azure Files share
capacity
• Does have a storage charge
34. Caution!
• If you delete the storage account, you lose the backups
• Place a DELETE lock on the storage account
• Limit contributor/owner/admin access to the storage
account
• Consider
• Dedicated subscription
• Azure Privileged Identity Management
35. Backups
• Scheduled by the Azure Backup Recovery Services Vault
• Can also be triggered manually
• After setup, manage backup/restores via:
• Azure Files share
• Recovery Services Vault
36. Restores
• A thing of beauty:
• Done in the cloud
• Synchronises to server endpoints within a few minutes
• Reparse points (cloud tiering) by default, and files are downloaded on
demand
• Restore huge amounts “from the cloud” and be operational in
minutes – see ransom-ware recovery
• You can:
• Restore a file/files/complete share
• To original location or create a new copy
• Overwrite/skip existing copies
37. Process of Enabling Backup
1. Create a recovery services vault
• Same region as the general purpose storage account
• Setup alerting
• Configure LRS/GRS before registration
2. Add an Azure Files backup item
• Select the storage account
• Select share(s) from the storage account
3. Configure a backup policy
4. Check your logs after first backup
39. AFS + Previous Versions
• Available from AFS Agent v9
• Must be enabled per volume
on the file server
• Import-Module
‘<SyncAgentInstallPath>StorageSync.Managem
ent.ServerCmdlets.dll’
• Enable-StorageSyncSelfServiceRestore –
DriveLetter D -Force
Folder
File A
File B
Volume D:
File Server
Folder
File A
File B
Volume D:
Azure File Sync
Folder
File A
File B
A tiered file holds a reference
40. Previous Versions
• User opens share in File Explorer
• Right-click a file
• Open Previous Versions
• Drag’n’drop old file version to replace current file
42. Near Instant
• We’ve already discussed the process
• Add a new server endpoint
• You create a new file server
• Install the File Sync Agent & register it with the old Storage Sync
Service
• Edit the Sync Groups and add the new file server
• The shares will appear within a few minutes
• Recovered shares
• 100% cloud-tiered to begin with
• Files downloaded on demand
• Tiering will eventually cloud-tier any downloaded cold files when the
volume % limit is reached
45. Usual Suspect – StorageSync Filter Driver
• Used by the Sync Service Agent when tiering is enabled
• Make sure StorageSync filter driver is OK – FLTMC Instances
• Have you enough RAM?
• Is the data volume full?
• 0x8e5e0211 and/or 0x80c8031a errors
• Have you on-prem backup?
• Have you checked your AV for respect of the “O” attribute?
47. FAQ
• Is there file lock sync?
• No
• Is there support for Azure AD RBAC
• Yes
• But not recommended to use the cloud shares directly
• Can we use Private Link?
• Yes, requires private endpoints for AFS and for Azure Files
• Is there anti-virus for Azure Files?
• No
• AV on the file server
• Security Center Advanced Threat Protection for Azure Files
49. The Rise of Replicas
• In my experience:
• Azure Backup was the biggest entry point to Azure (small/medium
business)
• It was non-disruptive
• Added life/value to file servers
• But it only dealt with backup
• Azure File Sync
• Deals with the reality that the file server is still alive
• Is the next big hybrid service
• Synchronisation, capacity, backup and DR solution
• Extremely valuable for large restores from the cloud
• Could be a killer for branch offices
50. Thank You!
Aidan Finn, Azure MVP
http://www.aidanfinn.com
http://www.innofactor.com
@joe_elway
Cloud Mechanix
Next Class – ONLINE July 30th
“Securing Azure Services & Data Through Azure
Networking””
https://july302020.cloudmechanix.com/
Editor's Notes
#2: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#3: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#4: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#5: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#6: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#7: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#8: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#9: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#10: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#11: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#13: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#14: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#15: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#16: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#17: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#18: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#19: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#21: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#22: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#23: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#24: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#25: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#26: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#27: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#28: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#29: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#30: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#31: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#32: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#33: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#34: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#35: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#36: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#37: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#38: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#39: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#41: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#42: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#43: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#44: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#45: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#46: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#47: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#48: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#49: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.
#50: To add your image, first delete the place holder image as shown in the white box.Then insert your picture and scale it to be bigger than the size of the white box shown.Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.