Select Page
Adrian_Rupp_0-1590520284345.png

Part 4 – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Configure SQL Server This is Part: 4 of a 4-part blog series: After setting up Azure Active Directory and registering the AAD Application and additionally creating an Azure Key Vault, the next step is to put it all together in ... continue reading
Adrian_Rupp_0-1590520284345.png

SQL Server Transparent Data Encryption and Extensible Key Management Using Azure Key Vault – Part 4

Configure SQL Server This is Part: 4 of a 4-part blog series: After setting up Azure Active Directory and registering the AAD Application and additionally creating an Azure Key Vault, the next step is to put it all together in ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Pt 6 – M365 Integration

For our final stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing M365 Integration. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack Part 5 – Data

For our fourth stop in the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Data security. For anyone new joining us on this journey please ensure you check out Part I: Overview, Part ... continue reading
Naveen_Kanneganti_0-1585926100333.png

ConfigMgr Bitlocker Management

Hi Folks! I’m Naveen kanneganti and Welcome to my blogpost. Configmgr has release BitLocker Drive Encryption (BDE) in v1910 for on-premises Windows clients running Windows 10 or Windows 8.1. This feature is optional so, you must enable this feature before ... continue reading
Az Update:  Azure Databox, Exam Study Guides, PowerShell 7, Free Office 365 E1 trial

Az Update: Azure Databox, Exam Study Guides, PowerShell 7, Free Office 365 E1 trial

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on two exciting things I learned this week. In this update, I want to share a ... continue reading

SMB is Dead, Long Live SMB!

Hello again, James Kehr here with another guest post. Titles are hard to do. They must convey the topic to the reader while being both interesting and informative, all at the same time. Doing this with a technical article makes ... continue reading

A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack – Part 1 – Overview

Welcome everyone! My name is James Key and I’ll be your guide as we take a journey through the possibilities of holistic cloud protection with the Microsoft 365 security stack. I am a Premier Field Engineer at Microsoft who specializes ... continue reading
TrustEncr.png

The RC4 Removal Files Part 2: In AES We Trust

Background Flash back to the late 80's...mullets for all, Polo drenched teens, big hair, and RC4 in all it's glory. Life was good. Flash forward to now and all of these things are out of style. In the case of ... continue reading

The RC4 Removal Files Part 1: What’s in an error message?

I've been doing system administration since roughly 1994 and in that time I've come to realize one thing: making changes to established environments always causes a ripple effect. The impact of changes usually doesn't surface right away, so associating the ... continue reading