Last Update: Apr 16, 2024
A Windows Server Active Directory (AD) forest is the topmost logical container in an AD configuration. In this article, Michael Otey explains the role forests play in an AD configuration and why it is necessary to consolidate Active Directory forests and domains to improve security and management. Every Active Directory deployment contains at least one forest, the parent container in…
Last Update: Apr 16, 2024
The number of phone calls we make has been decreasing globally over the past several years. And there is a growing trend in using text-based messaging solutions, like WhatsApp, for contacting sales and support teams. This post is sponsored by 3CX Omnichannel is a term used within eCommerce and retail to define a business strategy…
Last Update: Apr 08, 2024
In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…
Last Update: Feb 15, 2024
Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…
In this article, you’ll learn some strategies to upgrade to Windows 11. Including learning about the planning and readiness phase. At times, I feel like the lion in Narnia – Aslan – being lectured and roaring back: Do Not Cite The Deep Magic To Me… I Was There When It Was Written. But I was…
As usual, we are looking forward to our annual Microsoft Teams free 1-day virtual conference, this year coming up November 30. In addition to the customary sessions presented by industry professionals and Microsoft MVPs on everything from managing users in the Admin Center to driving collaboration with proper governance, Petri’s Chief Technology Officer, Stephen Rose,…
Last Update: Nov 03, 2023
Nudge Security provides a simple and easy to implement solution to a challenging problem for organizations managing compliance, security, and governance of third-party cloud apps and services. Its simplicity encourages governed use of SaaS apps and the ability to monitor new apps and user signups. Nudge Security is a powerful alternative to complex products like…
Last Update: Aug 25, 2023
Every system administrator dreams of building the perfect Rube Goldberg machine of IT automation to manage the employee IT lifecycle, end to end, including IT offboarding. A new hire joins the company, HR files a ticket, and BAM! In an instant, all of the birthright accounts, access, and permissions are granted in a glorious cascade…
An often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…
I recently spoke to Sean Deuby, who is Principal Technologist at Semperis and an Identity expert. Sean told me about the importance of protecting identities in the current landscape and how Identity Threat Detection and Response (ITDR) is a critical component of the Zero Trust security model. The emergence of cloud computing and the shift…