Security, Compliance, and Identity Blog

Options
758
arishojaswi on May 20 2024 09:00 AM
4,724
Sarahzin_Shane on May 13 2024 09:15 AM
1,491
pri2agarwalz on May 09 2024 09:00 AM
3,481
Rod_Trent on May 08 2024 01:13 PM
1,986
pri2agarwalz on May 08 2024 08:57 AM
1,410
asafHarari on May 06 2024 09:00 AM
5,465
danielavillarreal on May 06 2024 09:00 AM
2,678
Nathalia_Borges on May 06 2024 09:00 AM
1,915
Vivian_Ma on May 06 2024 09:00 AM
9,730
Liz_Willets on May 06 2024 09:00 AM
1,382
Erin_Miyake on May 06 2024 09:00 AM
1,955
EricaToelle on May 06 2024 09:00 AM
4,437
Brjann Brekkan on May 06 2024 08:00 AM
9,847
Sascha Windrath on May 03 2024 02:23 PM
5,254
Alex Weinert on May 01 2024 02:00 PM
5,376
Roee Oz on May 01 2024 07:56 AM
24.9K
maayan_shaul on Apr 25 2024 09:00 AM
1,785
EricaToelle on Apr 25 2024 08:00 AM
5,518
DeanRubinstein on Apr 24 2024 10:29 AM
2,177
MannySahota on Apr 23 2024 01:35 PM
32.1K
rakiasegev on Apr 22 2024 09:00 AM
1,779
Kwee_Nguyen on Apr 22 2024 08:00 AM
6,345
Ashwin_msft on Apr 22 2024 07:00 AM
3,860
arishojaswi on Apr 19 2024 08:00 AM
4,098
Simone_Oor on Apr 17 2024 09:00 AM
3,488
PaulBrightmore on Apr 02 2024 06:00 AM
8,638
MannySahota on Mar 27 2024 03:52 PM
5,787
Daniel_Hidalgo on Mar 26 2024 08:00 AM
5,481
EdwinChan on Mar 25 2024 10:43 AM
22.1K
Rob Lefferts on Mar 14 2024 09:00 AM

Latest Comments

So if we use a point and print based windows print server to deploy printers to users/computers based on location AD location and all that, will this still work?WIll it be able to be simplified to not require drivers if all our printers are supported for WPP?Will we need a newer version of windows s...
0 Likes
Hi @SecPmCj thank you for your valueable article. Would you like to add words on nartac IIS crypt? It helps to understand Windows Server Crypto, cipher, orders and read and configure these. Of not limited to IIS but also Windows Server and Client in General and Server products such as Exchange Serve...
0 Likes
Sorry to hijack these comments but would like to ask the crowd here if they noticed these two phenomenon about Search-MailboxAuditLog, particularly in my case for Shared mailboxes, but I'm not sure that has any bearing on the issue. 1.) When you use Recover Deleted Items (i.e., items are in the Reco...
0 Likes
@Eric_Lawrence Thank you for the clarification and the excellent reference article. I had forgotten that strong naming and Authenticode are different things. I was not strong naming the assembly, only Authenticode signing which was definitely successful.
0 Likes
@Thehetz What steps specifically did you use to strong name the file? Strong Naming is a different sort of signature than Authenticode; you can Authenticode-sign binaries without Strong Naming them. (Fiddler does this, for example). https://stackoverflow.com/questions/4469646/net-strong-naming-vs-au...
0 Likes