Blog

Security

How to Enable Windows 11 Config Lock on Secured-Core PCs

Windows 11 Secured-core configuration lock (config lock) is a new system-level feature on the Windows 11 2022 Update to protect secured-core PCs from unintentional misconfiguration. When enabled, Windows 11 config lock should guarantee that secured-core PCs won’t be affected by configuration drift. In this article, I’ll be detailing how config lock works and how you…

View Article

IconZone

Description This utility changes desktop icons, start-menu icons and quick-launch icons as well as proxy settings whenever the computer’s IP address is changed. It is also capable of running scripts whenever the IP address changes. Here are a number of usage scenarios: Configure a laptop computer to automatically set the organizational proxy server as the…

View Article

Managing Office 365 Guest Accounts

Many Office 365 applications (Teams, Groups, Planner, SharePoint, etc.) now support external guest access. you might end up with a lot of guests, and like any good accommodation, some management is needed. In this article, we look at how to manage the guests created by Office 365.

View Article

Microsoft StaffHub – Another Use for Office 365 Groups

Microsoft StaffHub is a new Office 365 application built from bits of Office 365 Groups, Exchange Online, SharePoint Online, Azure, and Teams. The concept is simple – provide an application to allow the schedules of workers to be managed through a combination of browser and mobile interfaces. It’s an idea that will be popular with some Office 365 tenants, but it’s probably of limited interest to the majority.

View Article

Harnessing the Power of Ambiguous Name Resolution (ANR)

Harnessing the power of Ambiguous Name Resolution (ANR) Understanding ANR The computer industry loves acronyms. Acronyms save time, instead of having to utter long sentences and waste time; you can speak the latest buzzword in the form of an acronym and in addition to saving time you will also sound cool… The following article deals…

View Article

M365 Changelog: Announcing PowerPoint modern comments for enterprise general availability

Last Update: Jun 27, 2023

MC256459 – Updated June 24, 2021: Based on learnings from Microsoft’s early rings, they made the decision to make additional changes before they proceed with the rollout. Microsoft will deliver a new Message center post once they re-start the rollout. Microsoft thanks you for your patience. The comments feature in PowerPoint will be updated to the…

View Article

System Center 2012 SP1 – Orchestrator: EUPSCO Installation

Now that you know about System Center 2012 SP1 – Orchestrator: EUPSCO, discover how to install it with the help of this step-by-step tutorial.

View Article

Permissions and Role Based Access Control (RBAC) – Part I

1st installment by J. Peter Bruzzese in a guide to RBAC (Role Based Access Control), a new permissions model in Exchange Server 2010. RBAC allows you to define both a broad, as well as a more granular assignment of permissions to administrators, ensuring that they are given the appropriate permissions based on the roles they perform within your organization.

View Article

Using Office 365 Sensitivity Labels with Teams, Groups, and Sites

Office 365 Sensitivity Labels can now be applied to “containers” – Teams, Office 365 Groups, and SharePoint sites. Sensitivity labels replace the old text-only classifications that have been available since 2016. The labels don’t affect the contents of the containers, but they can control some container settings, like whether a team allows guest access or if it’s open to any tenant user to join. It’s yet another development in the label and protection story for Office 365.

View Article
Network Security

AWS Managed Active Directory vs. Self-Hosted AD: Which Solution is Best For Your Company?

Last Update: Oct 07, 2022

In this article, we’ll explore what you need to take into account when moving workloads that require a directory service like Active Directory (AD) on Amazon Web Services (AWS). As we’ll see, there are currently two options for deploying Active Directory-dependent workloads on AWS, using AWS Managed Active Directory or self-hosting Active Directory on AWS…

View Article
Go to page