dcsimg

Managing Identities and Passwords in Azure Active Directory

In the hybrid cloud world we live in today, using Identity Protection (IdP) and Privileged Identity Management (PIM) can help you lower your security risks. Read the post here: Managing Identities and Passwords in Azure Active Directory … [Read more...]

How to Use Storage Migration Service for Windows Server and Azure

This article reviews the scenarios, features, requirements, and best practices for using Storage Migration Services for Windows Server and Azure Read the post here: How to Use Storage Migration Service for Windows Server and Azure … [Read more...]

How to Define a Custom Azure AD Role in the Azure Portal

We've been able to define custom Azure resource roles for awhile now. Today I'll teach you how to create a custom Azure AD role. … [Read more...]

Searching Active Directory with PowerShell

For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory. … [Read more...]

Provide High Availability for Azure AD Connect

Once you start rolling with Azure AD Connect and hybrid identity between local Active Directory and Azure Active Directory, one of your first thoughts is, "What happens if my Azure AD Connect server goes offline?" … [Read more...]

[VIDEO] Hyper-V Masterclass – Debunking Virtual Domain Controller Myths

Should Hyper-V be in the domain? Can Hyper-V host its own domain controller? Eric Siron confronts some potentially crippling myths about Hyper-V and domain controllers in this video and also boots up an instance to put these mistruths to rest Read the post here: [VIDEO] Hyper-V Masterclass – Debunking Virtual Domain Controller Myths … [Read more...]

Do You Need An Active Directory Auditing Tool?

It’s an age-old question; can’t I just audit my Active Directory using native processes? Do I need to spend the time and money comparing, evaluating and implementing a third-party solution? In short, I believe the answer is yes. There are numerous reasons why native auditing isn’t stringent and enough to provide you with the information you need to detect and prevent data breaches, as well … [Read more...]

Improving Security and Compliance: 10 Common Active Directory Mistakes

It’s true to say that the majority of organizations understand that Active Directory is essentially the backbone of the IT infrastructure. Despite this, we see multiple instances every day of Active Directory being misused, abused or generally neglected when it comes to best practices. In this article, we’re going to go through a few of the most common mistakes organizations make that could lead … [Read more...]

When Active Directory Logon Controls Simply Aren’t Enough

Through Active Directory, administrators can assign and enforce the security policies of the entire domain and manage them from a central location. A big part of dealing with both external and internal attacks is tracking logon activity. Most organizations need to work on increasing log on control measures and proactively tracking the logon activities of all users. However, Active Directory logon … [Read more...]

PowerShell Script: Deploy VMs, and Configure the Guest OS in one Go on Hyper-V

I've been prepping for a lot of different speaking engagements coming up in the next few months and a very hot topic these days is the use of PowerShell and automation, when it comes to Hyper-V. With this in mind, I've prepped the below script for some of these upcoming discussions, and wanted to share it with the community so that it'll be of help to some people. Read the post here: PowerShell … [Read more...]