Steps for renewing NDES Service Certificates

For those organizations that used the Network Device Enrollment Service run into is the process for renewing the certificates for NDES. I never was able to find good instructions on how to do this. So, I had no choice but to create my own. The steps in this blog posting cover how to renew the…

2

Administrator Workstations

  I had previously published this information to  my blog and accidently removed it from here.  Re-adding the posting.  I hope to find time to update this for Windows 10 in the future. Windows 10 has a feature named Credential Guard which greatly increases the security of credentials and help limits their exposure. This blog…

0

Transitioning Your PKI to SHA2

Background Hashing Algorithms Hashing Algorithms take variable input and provide a unique fixed length output. Hashing algorithms have a number of desired properties. Those desired properties include that the hash should not be able to be reversed to determine the data that was inputted into the hash. Also, it should not be possible to produce…

2

Secure Administrator Workstations

Are you a systems administrator for your organization?  Do you have an administrative account that is a member of a privileged group such as Domain Admins or Enterprise Admins?  Do you use that account on the same machine on which you check your email, or browse the internet? If you answered yes to all of…

1

Microsoft Devices Security, Virtual Smart Cards Part 2: Deployment

Deploying Virtual Smart Cards I am going to cover how to deploy Virtual Smart Cards. In this section I am going to perform a simplified deployment using Active Directory Certificate Services and tpmvscmgr.exe. In a complex environment you may wish to use additional tools such as scripts and Forefront Identity Manager to assist in your…

0

Microsoft Devices Security, Virtual Smart Cards Part 1: Introduction and Trusted Platform Module (Updated 11/26/2014)

Given the recent breaches on companies both large and small, there has been an increased focus on security and secure authentication. This combined with the adoption of mobile devices to increase the productivity of the mobile worker has left many organizations looking for a way to secure authentication for mobile devices. For mobile devices such…

0

Windows Phone Awesomeness

Wow!!!  It’s pretty awesome to see the continued evolution of Windows Phone! I have posted in the past about some really cool features such as NFC and DataSense. But recently there have been a lot of interesting applications released for Windows Phone. GDR3 This morning when I woke up and checked my Windows Phone (HTC8X…

0

Getting Started with Windows Azure: Part 5 Getting Familiar with the Windows Azure Management Tools for Virtual Machines

Now, that we have created our first VM we want to get familiar with the Management Tools.  For the purpose of this blog posting, I will be covering the Management Tools presented by the Web Interface.  Specifically, I will be covering the management tools for Virtual Machines.  Once you login to Windows Azure (https://manage.windowsazure.com) you…

0

Getting Started with Windows Azure: Part 4 Creating a Virtual Machine from the Gallery

So, in my previous blog posting I covered how to create your first Virtual Machine in Windows Azure IaaS.  In that blog posting we used the QUICK CREATE method.  In this blog posting, we will be performing similar steps using the Virtual Machine from the Gallery wizard.  Creating a VM “From Gallery” is pretty straightforward,…

0