NoAD

LATEST

Cloud Computing

5 Reasons to Consolidate Active Directory Domains and Forests

Last Update: Apr 16, 2024

A Windows Server Active Directory (AD) forest is the topmost logical container in an AD configuration. In this article, Michael Otey explains the role forests play in an AD configuration and why it is necessary to consolidate Active Directory forests and domains to improve security and management. Every Active Directory deployment contains at least one forest, the parent container in…

View Article
Cloud Computing

3CX Full Contact Center Solution Adds Voice, Text, and Live Chat

Last Update: Apr 16, 2024

The number of phone calls we make has been decreasing globally over the past several years. And there is a growing trend in using text-based messaging solutions, like WhatsApp, for contacting sales and support teams. This post is sponsored by 3CX Omnichannel is a term used within eCommerce and retail to define a business strategy…

View Article
Storage

Top 5 Features to Look for in On-Premises Veeam Storage

Last Update: Apr 08, 2024

In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

View Article
Network Security

Top 10 Events to Audit in Active Directory to Uncover Security Risks

Last Update: Feb 15, 2024

Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

View Article
Windows 11 2022 Update

Upgrade to Windows 11 – The Road Ahead

In this article, you’ll learn some strategies to upgrade to Windows 11. Including learning about the planning and readiness phase. At times, I feel like the lion in Narnia – Aslan – being lectured and roaring back: Do Not Cite The Deep Magic To Me… I Was There When It Was Written. But I was…

View Article
Microsoft Teams AMA

GET-IT: Submit Your Questions for Microsoft Teams Product Manager Anupam Pattnaik

As usual, we are looking forward to our annual Microsoft Teams free 1-day virtual conference, this year coming up November 30. In addition to the customary sessions presented by industry professionals and Microsoft MVPs on everything from managing users in the Admin Center to driving collaboration with proper governance, Petri’s Chief Technology Officer, Stephen Rose,…

View Article
Cloud Computing

Streamlining SaaS Governance: How Nudge Security Simplifies Compliance and Security Management for Cloud Apps

Last Update: Nov 03, 2023

Nudge Security provides a simple and easy to implement solution to a challenging problem for organizations managing compliance, security, and governance of third-party cloud apps and services. Its simplicity encourages governed use of SaaS apps and the ability to monitor new apps and user signups. Nudge Security is a powerful alternative to complex products like…

View Article
Nudge Security IT offboarding

The Dirty Truth About IT Offboarding Automation

Last Update: Aug 25, 2023

Every system administrator dreams of building the perfect Rube Goldberg machine of IT automation to manage the employee IT lifecycle, end to end, including IT offboarding. A new hire joins the company, HR files a ticket, and BAM! In an instant, all of the birthright accounts, access, and permissions are granted in a glorious cascade…

View Article
Datacenter networking servers

The Ultimate Guide to Web Application Firewalls (WAF)

An often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…

View Article
Security

The Role of Identity Threat and Detection Response in Zero Trust Security

I recently spoke to Sean Deuby, who is Principal Technologist at Semperis and an Identity expert. Sean told me about the importance of protecting identities in the current landscape and how Identity Threat Detection and Response (ITDR) is a critical component of the Zero Trust security model. The emergence of cloud computing and the shift…

View Article
Go to page