Select Page
TrustEncr.png

The RC4 Removal Files Part 2: In AES We Trust

Background Flash back to the late 80's...mullets for all, Polo drenched teens, big hair, and RC4 in all it's glory. Life was good. Flash forward to now and all of these things are out of style. In the case of ... continue reading

The RC4 Removal Files Part 1: What’s in an error message?

I've been doing system administration since roughly 1994 and in that time I've come to realize one thing: making changes to established environments always causes a ripple effect. The impact of changes usually doesn't surface right away, so associating the ... continue reading
The Case of SPNs Breaking Group Policy Application

The Case of SPNs Breaking Group Policy Application

Hello Everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SMC). I’ll share with you something interesting that I came across recently where one of our Enterprise customers had multiple clients where ... continue reading
How it works: Backup and restore for Microsoft Authenticator

How it works: Backup and restore for Microsoft Authenticator

Hello! With the dust settling from Ignite 2019, let’s dive in with “how stuff works” – focusing on the Microsoft Authenticator’s backup and restore feature. Earlier this year we released the Microsoft Authenticator backup and restore feature on iOS and ... continue reading
A diagram looking at the responsibilities of the customer versus the service they are using.

SAP on Azure Architecture – Designing for security

This blog post was contributed to by Chin Lai The, Technical Specialist, SAP on Azure. This is the first in a four-part blog series on designing a great SAP on Azure Architecture, and will focus on designing for security. Great ... continue reading
Secure Credentials with Self-Signed Certificates for PowerShell Scripts

Secure Credentials with Self-Signed Certificates for PowerShell Scripts

First published on TECHNET on Jan 14, 2019 Hello everyone, I'm Preston K. Parsard, specializing in Platforms, Azure Infrastructure and Automation topics, and I'd like to share some insights for securing PowerShell credentials using certificates. This post is based on ... continue reading
SCCM: "The encryption type requested is not supported by the KDC" Error When Running Reports

SCCM: “The encryption type requested is not supported by the KDC” Error When Running Reports

First published on TECHNET on Jan 29, 2019 Introduction Hello, my name is Richard McIver and I'm a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager.I was recently working with a customer who suddenly started receiving a ... continue reading
Tough Questions Answered: Can I disable RC4 Etype for Kerberos on Windows 10?

Tough Questions Answered: Can I disable RC4 Etype for Kerberos on Windows 10?

Today I want to share with you a direct experience from the field. One customer received from the security team the request to disable the RC4 ETYPE (Encryption Type) for Kerberos for the windows 10 Clients, so the support team ... continue reading
Top 10 Networking Features in Windows Server 2019: #6 High Performance SDN Gateways

Top 10 Networking Features in Windows Server 2019: #6 High Performance SDN Gateways

First published on TECHNET on Aug 15, 2018Share On:Twitter Share On: LinkedInThis blog is part of a series for the Top 10 Networking Features in Windows Server 2019!-- Click HERE to see the other blogs in this series.Look for the ... continue reading
Windows Server 101: Hardening IIS via Security Control Configuration

Windows Server 101: Hardening IIS via Security Control Configuration

IIS, the web server that’s available as a role in Windows Server, is also one of the most used web server platforms on the internet. Hardening IIS involves applying a certain configuration steps above and beyond the default settings. The ... continue reading