Select Page
Improve cyber supply chain risk management with Microsoft Azure

Improve cyber supply chain risk management with Microsoft Azure

For years, Microsoft has tracked threat actors exploiting federal cyber supply chain vulnerabilities. Supply chain attacks target software developers, systems integrators, and technology companies. Tactics often include obtaining source code, build processes, or update mechanisms to compromise legitimate applications. This ... continue reading
clipboard_image_0.jpeg

BitLocker, Intune, and Raven

Hello Paul Bergson, back again with another story about my dog Raven. From time to time we get a visit from a family member and they will bring their dog along, problem is we have never socialized Raven with other ... continue reading
Spear phishing campaigns—they’re sharper than you think

Spear phishing campaigns—they’re sharper than you think

Even your most security-savvy users may have difficulty identifying honed spear phishing campaigns. Unlike traditional phishing campaigns that are blasted to a large email list in hopes that just one person will bite, advanced spear phishing campaigns are highly targeted ... continue reading
How_to_Force_a_Full_Password_Sync_in_AzureAD_Connect_001.png

PowerShell Basics: How to Manage Azure Resources via PowerShell

PowerShell automation can be powerful when harnessed correctly. Whats more is that its capabilities can expand well beyond on-premises. To get started on this journey, this post will look at how to manage Azure Resources via PowerShell to further our ... continue reading
TrustEncr.png

The RC4 Removal Files Part 2: In AES We Trust

Background Flash back to the late 80's...mullets for all, Polo drenched teens, big hair, and RC4 in all it's glory. Life was good. Flash forward to now and all of these things are out of style. In the case of ... continue reading

The RC4 Removal Files Part 1: What’s in an error message?

I've been doing system administration since roughly 1994 and in that time I've come to realize one thing: making changes to established environments always causes a ripple effect. The impact of changes usually doesn't surface right away, so associating the ... continue reading
ASOS better protects its data with Azure AD automated user provisioning

ASOS better protects its data with Azure AD automated user provisioning

In today’s issue of the ‘Voice of the Customer’ series, we dive into the world of fashion with ASOS. ASOS is an online retailer devoted to “fashion with integrity.” With customers all over the world, the company’s ecommerce site must ... continue reading
The Case of SPNs Breaking Group Policy Application

The Case of SPNs Breaking Group Policy Application

Hello Everyone, my name is Zoheb Shaikh and I’m a Solution Engineer working with Microsoft Mission Critical team (SMC). I’ll share with you something interesting that I came across recently where one of our Enterprise customers had multiple clients where ... continue reading

What’s the difference between Group Policy and Azure Policy?

To understand the difference between Group Policy and Azure Policy, we need to start with the architecture differences regarding how devices are seen in a Windows Server domain versus in Microsoft Azure. Traditional Group Policy architecture is based on Users ... continue reading
MIM 2016 SP1 - Service and Portal Installation Guide

MIM 2016 SP1 – Service and Portal Installation Guide

First published on MSDN on Jul 19, 2018 Introduction: This document is intended to be used as an operational build document for the Microsoft Identity Management 2016 MIM Service and Portal Server installation. This guide does not cover the installation ... continue reading