IT Knowledgebase Articles

Network Security

Top 10 Events to Audit in Active Directory to Uncover Security Risks

Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

View Article
Security

What Is IAM? A Guide to Identity and Access Management

Identity and Access Management (IAM), is a crucial cybersecurity framework that governs and secures digital access to resources. It plays a pivotal role in helping organizations control and secure their digital resources such as apps, files, user identities, permissions, and all other organizational data. IAM also helps ensure the confidentiality and integrity of sensitive information….

View Article
Datacenter networking servers

Windows Server Backup: A Step-by-Step Guide

Last Update: Jan 25, 2024

How familiar are you with Windows Server Backup? You may be surprised by its value in your organization. I’ll explain what its main purpose is and how to use it to back up an Active Directory domain controller and fileservers. What is Windows Server Backup? Windows Server has had a built-in backup application since Windows…

View Article
Datacenter networking servers

NTFS Permissions: A Comprehensive Guide

Windows allows users to assign permissions to files and folders, for added security and to control which users can perform specific actions on files and folders. Learn all you need to know about basic permissions, folder permissions, user permissions, explicit permissions, and much more. What are NTFS permissions? NTFS permissions, first introduced with Microsoft Windows…

View Article
Datacenter networking servers

Strategic IT Planning in Complex Organizations

In the ever-changing world of IT, aligning strategic objectives with evolving user needs and business goals is a formidable challenge, especially in large, multifaceted organizations. In a recent interview on Petri’s UnplugIT podcast, Tim Aberle, a principal IT architect at a Fortune 500 entertainment company, shed light on this intricate process. The insights he provided…

View Article
Cloud Computing

Microsoft Leads the Way in Responsible AI Integration and ESG Compliance

Artificial intelligence (AI) has rapidly evolved from a sci-fi fantasy to a part of the everyday vernacular for individuals and businesses alike. The guidance and insights in this blog post dissect how AI can apply to all aspects of ESG compliance and how companies like Microsoft are shining examples of how to integrate responsible AI…

View Article
Datacenter networking servers

Do I Need Antivirus on Azure Stack HCI?

As Azure Stack HCI becomes more common in datacenters and at the network edge, I would like to highlight some frequently asked questions I have encountered during the last few months about software and Azure Stack HCI antivirus. Does Microsoft support third-party software on Azure Stack HCI? In general, you can say “Microsoft does not…

View Article
PowerShell

Set-ExecutionPolicy – Mastering PowerShell Execution Policy

Last Update: Dec 08, 2023

PowerShell is considered secure by default due to various design principles and features that Microsoft incorporated into its architecture. These measures aim to ensure that PowerShell provides a robust, yet safe, scripting environment for system administration tasks. One feature of PowerShell that contributes to this are known as execution policies, which can be set using…

View Article
Windows 11 2022 Update

Upgrade to Windows 11 – The Road Ahead

In this article, you’ll learn some strategies to upgrade to Windows 11. Including learning about the planning and readiness phase. At times, I feel like the lion in Narnia – Aslan – being lectured and roaring back: Do Not Cite The Deep Magic To Me… I Was There When It Was Written. But I was…

View Article
Azure hero approved 5

Making Microsoft Azure Penetration Testing Work to Combat Threats

This short guide explains how Microsoft Azure penetration testing solutions can work to enhance a native public cloud platform within Azure, and what IT professionals can do to proactively defend against evolving numbers of serious threats, thus bolstering their security posture. As far as public cloud infrastructure solutions go, there is perhaps none more versatile…

View Article
Go to page