Select Page
Building the Totally Network Isolated Root Certification Authority

Building the Totally Network Isolated Root Certification Authority

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. Lately I have done quite a few Public Key Infrastructure (PKI) migrations for customers mostly because their certification authorities ... continue reading

Defending the power grid against supply chain attacks—Part 1: The risk defined

Most people don’t think about electricity. If the internet works, their food is refrigerated, and their debit card is approved, why should they? Its ubiquity and reliability render it invisible—a bit of magic that powers much of modern life. That ... continue reading
Image of a worker approving a sign-in from his phone.

Changing the Monolith—Part 4: Quick tech wins for a cloud-first world

You may have heard that identity is the “new” perimeter. Indeed, with the proliferation of phishing attacks over the past few years, one of the best ways to secure data is to ensure that identity—the primary way we access data—can ... continue reading
Connecting iPads to an Enterprise Wireless 802.1x Network Using Certificates and Network Device Enrollment Services (NDES)

Connecting iPads to an Enterprise Wireless 802.1x Network Using Certificates and Network Device Enrollment Services (NDES)

First published on TECHNET on Feb 27, 2012Important notice : Microsoft does not support any apple products, if you need to troubleshoot any problem related to apple products, please refer to http://www.apple.com/supportWarning SCEP was designed to be used in a ... continue reading
Hyper-V for Developers on Windows 10

Hyper-V for Developers on Windows 10

Hyper-V is more known as a server virtualization technology; however, since Windows 8, it is also available in the client operating system. In Windows 10, Microsoft improved the experience drastically to make Hyper-V an excellent solution for developers and IT ... continue reading
Replace passwords with a biometric security key

Replace passwords with a biometric security key

Hi everyone, I am deeply passionate about keeping my customers secure.  We are on a mission to eliminate passwords since they can be easily shared, leaked, or cracked.  Our goal is to replace them with strong authentication methods such as ... continue reading
The Case Of The Capture Media Not Working Or Tsmbautorun.Exe Not Working

The Case Of The Capture Media Not Working Or Tsmbautorun.Exe Not Working

First published on TECHNET on Aug 09, 2012 Authored by Santos Martinez TSMBAutoRun.exe is the tool used to Capture Images with System Center 2012 Configuration Manager This week I was working with a customer on capture their main operating system ... continue reading
Microsoft passwordless partnership leads to innovation and great customer experiences

Microsoft passwordless partnership leads to innovation and great customer experiences

Hello! In this Voice of the Independent Software Vendor (ISV) blog series post, we'll talk about passwords—or rather, moving beyond passwords to incorporate security into a passwordless world. The only people who like passwords are bad actors who use them ... continue reading
PPKGs Part 2 - Testing and deploying provisioning packages for Windows 10 1607

PPKGs Part 2 – Testing and deploying provisioning packages for Windows 10 1607

First published on TECHNET on Feb 20, 2017Hello again, is it really a week since I wrote Part 1 ?Without further ado, let's get cracking.So in Part 1 we created a simple provisioning package. Now we want to test that ... continue reading
Enabling Data Deduplication on Windows Server 2019 Volumes

Enabling Data Deduplication on Windows Server 2019 Volumes

I was recently asked to help out our friends at Channel 9 with a storage problem. They capture large video files as part of their recordings and have to have them local for fast access in order to edit them ... continue reading