Select Page
Step-By-Step: Connect your AWS and Azure environments with a VPN tunnel - Updated

Step-By-Step: Connect your AWS and Azure environments with a VPN tunnel – Updated

Hello Folks, Three years ago, I was working with a customer that wanted to connect their VPC on AWS to their virtual network in Azure so they could move data around and migrate some workloads. Lately I’ve been receiving some ... continue reading
PowerShell Basics: How to Troubleshoot Active Directory Replication Issues

PowerShell Basics: How to Troubleshoot Active Directory Replication Issues

There are certain windows cmdlets and utilities which we can use for replication issues troubleshooting purpose. Among those, Repadmin.exe is most commonly used Microsoft utility. This is available in servers which have AD DS or AD LDS role installed. It ... continue reading
machine_learning_toyota_001

Step-By-Step: Getting Started with Azure Machine Learning

Artificial Intelligence (AI) study and use is on the rise. Tools to enable AI are becoming more readily available, simpler to use and easier to implement. What's more is that the definition of AI itself has been broken down into ... continue reading
Securing Applications with Least Privileged Service Accounts

Securing Applications with Least Privileged Service Accounts

___________________________________________________________________________________________________________________________ IMPORTANT ANNOUNCEMENT FOR OUR READERS! AskPFEPlat is in the process of a transformation to the new Core Infrastructure and Security TechCommunity, and will be moving by the end of March 2019 to our new home at https://aka.ms/CISTechComm (hosted at ... continue reading
Windows Server 101: Hardening IIS via Security Control Configuration

Windows Server 101: Hardening IIS via Security Control Configuration

IIS, the web server that’s available as a role in Windows Server, is also one of the most used web server platforms on the internet. Hardening IIS involves applying a certain configuration steps above and beyond the default settings. The ... continue reading
Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 101: Understanding Third Party Security Configuration Baselines

Windows Server 2016 comes reasonably secure “out of the box”. But it’s important to remember that while the server is reasonably secure, not every security control that is can be configured for Windows Server 2016 (and the more recently released ... continue reading
1.png

PowerShell Basics: How to Check Active Directory Replication Status

Data Replication is crucial for healthy Active Directory Environment. There are different ways to check status of replication. In this article I am going to explain how you can check status of domain replication using PowerShell. For a given domain ... continue reading
Using PowerShell to import and export Azure Blueprints

Using PowerShell to import and export Azure Blueprints

I’ve previously written an overview of what Azure Blueprints are and why you’d use them, so if you are unfamiliar with them, check out Getting started with Azure Blueprints. As the Azure Blueprints service is still in Preview, you won’t ... continue reading
Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Introduction Hello, my name is Richard McIver and I’m a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager. I was recently working with a customer who suddenly started receiving a strange KDC error when attempting to run ... continue reading
Loading...