Select Page

Your password doesn’t matter—but MFA does!

Your pa$$word doesn’t matter—Multi-Factor Authentication (MFA) is the best step you can take to protect your accounts. Using anything beyond passwords significantly increases the costs for attackers, which is why the rate of compromise of accounts using any MFA is ... continue reading
:smile:

All your creds are belong to us!

A few days ago, our team helped someone who had been a target of account takeover (ATO). Despite protecting the account with mandatory two-step verification using SMS and the Authenticator app, attackers had broken into the account and changed the ... continue reading

Virtualization-Based Security: Enabled by Default

Virtualization-based Security (VBS) uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system. Windows can use this "virtual secure mode" (VSM) to host a number of security solutions, providing them with greatly ... continue reading
Step-By-Step: Manage file storage growth with Azure File Sync

Step-By-Step: Manage file storage growth with Azure File Sync

At this point I’m sure you’re heard about Azure File Sync. If you have not, Azure File Sync (AFS) is a service that centralizes your file shares in Azure Files, while keeping the flexibility, performance, and compatibility of an on-premises ... continue reading
How to Setup Network Load Balancing for Configuration Manager Software Update Points

How to Setup Network Load Balancing for Configuration Manager Software Update Points

First published on TECHNET on Aug 01, 2016Authored by Cameron Cox Before we get started a huge thank you to Meghan Stewart (Support Escalation Engineer) and Mike Johnson (Senior Support Escalation Engineer) for their knowledge and assistance with this blog.I ... continue reading
Updated: Step by Step Guide to Setting Up System Center Configuration Manager to Support  Management and Installation of the ConfigMgr Client on Mac OS Computers

Updated: Step by Step Guide to Setting Up System Center Configuration Manager to Support Management and Installation of the ConfigMgr Client on Mac OS Computers

First published on TECHNET on Oct 04, 2014Authored by Clifton HughesI have recently had several requests asking about the support for managing Mac OSx computers in System Center 2012 R2 Configuration Manager, so I went to work in my lab ... continue reading
1 Azure AD and F5.png

Azure AD + F5—helping you secure all your applications

Howdy folks, We often hear from our customers about the complexities around providing seamless and secure user access to their applications—from cloud SaaS applications to legacy on-premises applications. Based on your feedback, we’ve worked to securely connect any app, on ... continue reading
How to prevent phishing attacks that target your customers with DMARC and Office 365

How to prevent phishing attacks that target your customers with DMARC and Office 365

You already know that email is the number one attack vector for cybercriminals. But what you might not know is that without a standard email security protocol called Domain Message Authentication, Reporting, and Conformance (DMARC), your organization is open to ... continue reading
Azure AD expands integration with SAP Identity Authentication Service  1.png

Azure AD expands integration with SAP Identity Authentication Service

Howdy folks, I’m excited to share that you can now connect enterprise identities between Microsoft services such as, Azure and Office 365 and the SAP Cloud Platform, so you can build unique cross-cloud experiences! Through our partnership with SAP, you ... continue reading
gmsa1.png

Step-by-Step: How to work with Group Managed Service Accounts (gMSA)

Services Accounts are recommended to use when install application or services in infrastructure. It is dedicated account with specific privileges which use to run services, batch jobs, management tasks. In most of the infrastructures, service accounts are typical user accounts ... continue reading