Michael Taschler profile picture

Follow Michael

Michael Taschler

Petri Contributor

Michael Taschler is an IT veteran with over two decades’ worth of
experience designing, building, securing, operating and troubleshooting
cloud and enterprise systems. He is passionate about innovation, digital
transformation and how we can create value by helping people and
organisations build a better working world, from the mundane processes
that can be automated to the complex problems that can be solved by
using established as well as emerging technologies. Michael currently
works as a cybersecurity consultant for a global professional services
company with a focus on Microsoft Azure and 365.


Microsoft 365 Apps

Understanding Office 365 Quarantine

Last Update: Jul 24, 2023

Microsoft’s Office 365 Quarantine is a new service designed to keep organizations safer by moving all suspicious messages to a secure location. In this guide, we’ll explain how Office 365 Quarantine works and how IT admins can use it to protect users in an organization from malicious files and messages. What is Office 365 Quarantine?…

View Article
Datacenter networking servers

How to Download, Install, and Configure Azure AD Connect V2

Last Update: Jul 17, 2023

In this guide, I’ll provide information on where to download Azure Active Directory (recently renamed Microsoft Entra ID) Connect V2 and walk you through the installation and configuration of it. Microsoft states that the most common topology is a single on-premises forest, with one or multiple domains, and a single Azure AD tenant. My guide will…

View Article
Network Security

Active Directory vs. Azure AD (and Other Identity Providers)

Last Update: Oct 14, 2022

This article will look at Active Directory (AD), Azure Active Directory (Azure AD), and explain how they differ and can complement each other. We’ll also compare these Microsoft solutions to some of the major alternative identity providers. This article is not meant to be an exhaustive resource and will not provide step-by-step instructions on how…

View Article
Datacenter networking servers

Best Practices for Installing Active Directory Domain Controllers in a Virtual Machine

Last Update: Sep 12, 2022

Installing Active Directory domain controllers in a virtual machine (VM) can be useful if you want to separate them from the physical network, giving you more flexibility and additional protection for your Active Directory infrastructure. In this guide, we’re going to detail the best practices for installing Active Directory domain controllers (DCs) in a virtual…

View Article

The Top 10 Ipconfig Commands You Should Learn

In this article, I’m going to show you how to use the command-line tool ipconfig. If you’re an IT admin, ipconfig is a very useful console application program that can help you troubleshoot network connectivity problems in Windows. Linux and other operating systems (OS) have similar capabilities, but they often use different commands to achieve…

View Article

Active Directory Security – 5 Steps to Secure AD

Last Update: May 17, 2022

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article