Select Page
Graph showing ContosoCars locations, device ownership, groups, platforms, and requirements. All part of their use-case management plan.

Step 5. Set up mobile device management: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment ... continue reading
Screenshot of the new Azure AD Identity Protection Security Overview dashboard.

The evolution of Microsoft Threat Protection, February update

February is an exciting month of enhancements for Microsoft Threat Protection. For those who have followed our monthly updates (November, December, and January), youre aware that Microsoft Threat Protection helps provide users optimal security from the moment they sign in, ... continue reading
PowerShell Basics: How to Troubleshoot Active Directory Replication Issues

PowerShell Basics: How to Troubleshoot Active Directory Replication Issues

There are certain windows cmdlets and utilities which we can use for replication issues troubleshooting purpose. Among those, Repadmin.exe is most commonly used Microsoft utility. This is available in servers which have AD DS or AD LDS role installed. It ... continue reading

Simplify Always On availability group deployments on Azure VM with SQL VM CLI

Always On availability groups (AG) provide high availability and disaster recovery capabilities to your SQL Server database, whether on-premises, in the cloud, or a combination of both. Manually deploying an availability group for SQL Server on Azure Virtual Machines (VM) ... continue reading
Securing Applications with Least Privileged Service Accounts

Securing Applications with Least Privileged Service Accounts

___________________________________________________________________________________________________________________________ IMPORTANT ANNOUNCEMENT FOR OUR READERS! AskPFEPlat is in the process of a transformation to the new Core Infrastructure and Security TechCommunity, and will be moving by the end of March 2019 to our new home at https://aka.ms/CISTechComm (hosted at ... continue reading
1.png

PowerShell Basics: How to Check Active Directory Replication Status

Data Replication is crucial for healthy Active Directory Environment. There are different ways to check status of replication. In this article I am going to explain how you can check status of domain replication using PowerShell. For a given domain ... continue reading
Step 4. Set conditional access policies: top 10 actions to secure your environment

Step 4. Set conditional access policies: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and ... continue reading
Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Introduction Hello, my name is Richard McIver and I’m a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager. I was recently working with a customer who suddenly started receiving a strange KDC error when attempting to run ... continue reading
Azure AD makes sharing and collaboration seamless for any user with any account

Azure AD makes sharing and collaboration seamless for any user with any account

Howdy folks, Azure AD B2B Collaboration provides customers with an easy way to share applications and collaborate with people from any organization, whether or not they have Azure AD or an IT department. We’ve been working to make B2B Collaboration ... continue reading
Loading...