Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…
Identity and Access Management (IAM), is a crucial cybersecurity framework that governs and secures digital access to resources. It plays a pivotal role in helping organizations control and secure their digital resources such as apps, files, user identities, permissions, and all other organizational data. IAM also helps ensure the confidentiality and integrity of sensitive information….
Last Update: Jan 25, 2024
How familiar are you with Windows Server Backup? You may be surprised by its value in your organization. I’ll explain what its main purpose is and how to use it to back up an Active Directory domain controller and fileservers. What is Windows Server Backup? Windows Server has had a built-in backup application since Windows…
Windows allows users to assign permissions to files and folders, for added security and to control which users can perform specific actions on files and folders. Learn all you need to know about basic permissions, folder permissions, user permissions, explicit permissions, and much more. What are NTFS permissions? NTFS permissions, first introduced with Microsoft Windows…
In the ever-changing world of IT, aligning strategic objectives with evolving user needs and business goals is a formidable challenge, especially in large, multifaceted organizations. In a recent interview on Petri’s UnplugIT podcast, Tim Aberle, a principal IT architect at a Fortune 500 entertainment company, shed light on this intricate process. The insights he provided…
Artificial intelligence (AI) has rapidly evolved from a sci-fi fantasy to a part of the everyday vernacular for individuals and businesses alike. The guidance and insights in this blog post dissect how AI can apply to all aspects of ESG compliance and how companies like Microsoft are shining examples of how to integrate responsible AI…
As Azure Stack HCI becomes more common in datacenters and at the network edge, I would like to highlight some frequently asked questions I have encountered during the last few months about software and Azure Stack HCI antivirus. Does Microsoft support third-party software on Azure Stack HCI? In general, you can say “Microsoft does not…
Last Update: Dec 08, 2023
PowerShell is considered secure by default due to various design principles and features that Microsoft incorporated into its architecture. These measures aim to ensure that PowerShell provides a robust, yet safe, scripting environment for system administration tasks. One feature of PowerShell that contributes to this are known as execution policies, which can be set using…
In this article, you’ll learn some strategies to upgrade to Windows 11. Including learning about the planning and readiness phase. At times, I feel like the lion in Narnia – Aslan – being lectured and roaring back: Do Not Cite The Deep Magic To Me… I Was There When It Was Written. But I was…
This short guide explains how Microsoft Azure penetration testing solutions can work to enhance a native public cloud platform within Azure, and what IT professionals can do to proactively defend against evolving numbers of serious threats, thus bolstering their security posture. As far as public cloud infrastructure solutions go, there is perhaps none more versatile…