Step-by-Step: Azure Storage Encryption at Rest

Hello Folks, Ever since I started covering Azure I always get asked about encryption. How do I keep data from prying eyes? How do I ensure that the data is ALWAYS encrypted? Encryption at rest was not an option before, but now it is…. Azure Storage Service Encryption (SSE) for Data at Rest allows you…

2

Step-By-Step: Displaying info regarding previous logons on Windows 10

The Consumer Electronics Show has always been a blur of innovative device launches from a multitude of manufactures. CES 2017 has been no different other than an increase of devices running Windows 10. This comes as no surprise as many device manufactures plan to highlight their designs by complementing them with the upcoming Windows 10 Creators Update…

1

Step-By-Step: Enabling Restricted Admin Mode for Remote Desktop Connections

Introduced in Windows Server 2012 R2, Restricted Admin mode addresses the ability for a hacker to access plain-text or any other re-usable form of credentials to the remote PC or Server.  The solution will also not allow access to any other network resources from that pc or server through restricted admin mode connection with out…


Step-by-Step: Prevent, Detect, and Respond to Threats in an Azure Environment

Hello Folks, Almost every conversations i have with ITPROs regarding cloud adoption includes a discussion about their security concerns. How do I ensure that my cloud infrastructure is secure? How do I get visibility in regards to the threats against my environment.   Well, we have made available a dashboard that will help you prevent,…

0

Step-By-Step: Enabling Customer Lockbox in Office 365

Security is always top of mind for IT Professionals.  With more people demanding access to data (via smartphones, tablets, etc), IT Professionals have been challenged in providing secure seamless access. Some have been looking to cloud services to address this need but require assistance as to where to begin. The first question usually asked is: “Who really…

0

Simulating A Ransomware Attack With PowerShell

Ransomware issues have escalated as of late.  While there is a common belief that there is no sure fire way of guaranteeing your organization will never be hit by a ransomware attack, IT administrators should be prepared to detect, stop, and recover from it when it strikes. But how does one test for ransomware detection? While it is ill…


Addressing Pass-The-Hash Attacks with Windows 10 and Credentials Guard

People and organizations have increasingly become more and more dependent on technology.  What started as a means of communication, has now evolved into a deep repository of information provided by people and organizations shared publicly or privately. Alongside this progression, digital attacks have also evolved to attempt to steal said data for malicious use.  What started back in 2003…

0

Step-By-Step: Building Windows 10 Provisioning Packages

Standard practice for most IT administrators when migrating to a new client offering entails creating a baseline image of a desired client state. Next the IT administrator wipes the computer to be worked on to image it with the newly created client image.  This procedure is not without it’s faults however and hardware inconsistencies have…

0

Step-By-Step: Enabling Multi-Factor Authentication on XBOX ONE

Much of this week’s online news has been centered on the E3 event taking place in LA. Gamers, both passive and hardcore alike, have flocked to see what creativity publishers and console makers will unleash amidst gamer nation in the upcoming months. Microsoft’s XBOX E3 keynote was additionally interesting as both Windows 10 and Hololense…

0

Windows 10 Tips: Managing Universal Apps in an Enterprise Setting

Windows 8.1, Love it or hate it, was intended to be both a desktop and device operating system. Regardless of how you feel about Windows 8.1, if you were tasked with managing it in you enterprise, there are a number of posts written to assist you in that task. Microsoft recently announced that client management…

0