security
85 TopicsStep-By-Step: Creating an Azure Point-to-Site VPN
Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We can use point-to-site method to do that. In this method it will use certificates to do the authentication between end point and azure virtual network.216KViews12likes14CommentsStep-By-Step: Managing Windows 10 with Administrative ADMX templates
Windows 10 Administrative templates, released back in August 2015, are offered as language-neutral .admx files and language-specific .adml files used by Group Policy administrators to configure the same set of policies by using two languages. There are over 190 different administration templates included with Windows 10 and an additional 10 .admx files that can be downloaded here: Windows 10 Administrative Templates Download.105KViews2likes2CommentsStep-By-Step: Enabling Advanced Security Audit Policy via Directory Services Access
Active Directory is one of the more impactful services within an organization. Even small changes in Organization’s AD can cause a major business impact. Preventing any unauthorized access and unplanned changes in an AD environment should be top of mind for any system administrator. Would you have enough information to answer questions such as what has changed should changes or unauthorized access happen within your AD environment?84KViews4likes2CommentsPowerShell Basics: How to check if MFA is enabled in Azure and Office 365
Security governance has been top of mind for most since the onslaught of human malware has the masses working from home. This comes with new concerns surrounding identity protection and actually proving that remote users are who they say they are in order to be allowed access to organizational data. Multi-factor Authentication (MFA) is a great tool to ensure this however the task of knowing which user has it enabled can be tedious. Enter PowerShell to the rescue to automate reporting of this process.57KViews2likes8Comments