Step-By-Step: Enabling an Azure Active Directory Self-Service Password Reset

Password reset requests are a common nuisance for system administrators and the people they support.  Company operations can be negatively affected if users are not provided access to systems and applications promptly.  IT Professionals roll their eyes at password reset requests as they often come in while performing an important task. What if end users could securely reset their passwords…


DevOps Basics: Enabling The Puppet Virtual Machine Extension Via PowerShell

Practicing DevOps in one’s organization sometimes requires the inclusion of existing processes currently championing automation. One said solution via Puppet Lab provides a datacenter automation and configuration management solution that is widely used. While utilizing PowerShell to enable desired state configuration (DSC) can also be a viable option, some organizations may have current practices that…


Step-By-Step: Docker Client Setup for Windows

DevOps, while not entirely new, provides a new opportunity for both IT professionals and developers alike. The ability for the two roles to develop, ship, and run applications in collaboration can increase the agility of the supported organization to become more nimble in addressing it’s customer needs. Enter Docker, which provides the ability to quickly…

0

Step-By-Step: Enabling App Passwords in Azure AD with Two-Factor Authentication

For some, passwords alone are not enough to ensure secure access to specific applications. In the Microsoft Virtual Academy video entitled Getting Started with Microsoft Azure Active Directory, I demonstrated how to turn on two-factor authentication with Azure Active Directory. However, what if you have applications that don’t work with two-factor authentication? The following steps…


What is Azure Rights Management?

Azure Rights Management Services (RMS), newly added to Microsoft’s Enterprise Mobility Suite, enables the ability to help protect sensitive company information by controlling how said information is used and to block unauthorized access. The service uses identity, encryption, and authorization policies to insure files and email are secure. Rights Management stays with the files and…

2

Step-By-Step: Windows Azure - Back to the basics

Last week I talked about setting up the Online Backup Service for Windows Server 2012. Since then I’ve received a few message from IT Pros that felt like I skipped a step. They mentioned that Jumped right into the management portal. “How do you set up the account first?” they asked. You could start with…

1

Step-by-Step: Setup the Online Backup Service for Windows Server 2012

Hello Folks, When is the last time you had to restore data and you realized that the tape you need is in the vault at the offsite archive, across town… Anyone for a road trip? These situations are thing of the past. The Microsoft Online Backup Service is a cloud based backup solution for Windows…

5

TechEd North America 2013: Expand Your Network & Earn Certification

TechEd is Microsoft’s leading IT Professionals and Enterprise Developers technical conference being hosted on June 3rd -6th in New Orleans, LA. Those who have attended TechEd in the past have always found it rewarding in the aspect of professional development and industry networking.  Those who have yet to attend or are on the fence in deciding to attend, here’s…


Step-By-Step: Deploying Windows 8 Apps with System Center 2012 Service Pack 1

As of late Pierre Roman, Mitch Garvis, and I have enjoyed traveling the country delivering IT Pro Camps covering Windows 8 for Enterprise and Windows Server 2012.  We have thoroughly enjoyed connecting with those of like minds eager to learn new strategies around deployment, securing and managing infrastructure. We are also delighted to engage in conversations, usually sparked by attendees, sharing best practices.  As mentioned…

0

Step-by-Step: Building a FREE System Center 2012 Configuration Manager SP1 Lab

As mentioned in an earlier blog post, System Center 2012 SP1, Windows Intune and the BYOD Revolution, there are benefits to allowing users to supply their own smartphones and taking advantage of the BYOD trend.  Proper planning and management is encouraged to ensure BYOD stays as a benefit as opposed to become a threat.  While co-presenting alongside Mitch…

6