Technology Compliance Audits: Application and Server Patch Automation

Written by Rory McCaw on Thursday, December 6th 2018 — Categories: Patching, SCOM, SCCM, Datacenter Automation, Security

Meet Bruce.

Bruce is a 45-year-old IT manager, with twenty years experience working for ACME Power. Bruce has three photos on his desk – one of his wife, Linda; one of his kids - Davy and Wendy; and one of Microsoft CEO Satya Nadella. Apart from his laptop, Bruce’s desk is pristine. He walked into the office this morning with a big smile on his face and passed out donuts to his colleagues.

Today has been highlighted in Bruce’s Outlook calendar for weeks. It’s day one of a thorough compliance audit of ACME Power’s application and server infrastructure. 

Continue Reading...


Microsoft Azure Active Directory: Getting Started with Identity Management in the Cloud, Part 2

Written by Muditha Chathuranga on Wednesday, September 19th 2018 — Categories: Active Directory, Azure, Cloud Hosting, Microsoft, Security

Microsoft Azure Active Directory, or AAD, is an IDaaS (Identity as a Service) offering that helps you manage corporate identities in the cloud. In this blog series, we're taking a look at the primary AAD features that you'll use to get your ID management up and running for Azure cloud services.

In Part 1 we discussed Connect, Single-Sign On, and Multifactor Authentication. You can also find a table of AAD pricing on that post. Remember, this series is not a deep dive into AAD configuration, but rather an overview of key features. Depending on your SKU you may or may not have access to all of these features.

Part 2 includes Self Service Password Resets, Identity Protection, Conditional Access, and Privileged Identity Management. These features help you control access and maintain security and compliance protocol across your enterprise cloud.

Continue Reading...


Common Mistakes to Avoid When Configuring Network Policies for VPN

Written by Saeed Sheikh on Thursday, September 13th 2018 — Categories: Microsoft, Security

A Network Policy Server is Microsoft implementation of a RADIUS server that performs authentication, authorization, and accounting for remote VPN connections. Network policies are defined by network administrators to use conditions, settings, and constraints in order to determine who can connect to the network.

I was recently involved in reviewing the existing VPN solution and then deploying another solution for a client. Here are some common mistakes I found made when configuring these policies.

Continue Reading...


Why Would You Lease a New Car and Not Drive It for 12 Months?

Written by Rory McCaw on Tuesday, July 31st 2018 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Patching, Windows 10, O365, Azure, Microsoft, Security

Why do companies do this with software?

The concept sounds crazy. Logic says that you lease a car, start to drive it immediately, and continue to drive it for the lease term. Yet with Microsoft software, even cloud-based software like Azure, O365, Dynamics CRM, and Windows 10, companies continue to buy SaaS offerings on their traditional Enterprise Agreements (EAs) and pay for them before they start to use them.

Continue Reading...


6 Elements to Consider When Deploying Windows 10

Written by Rory McCaw on Monday, July 16th 2018 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Windows 10, O365, Azure, Microsoft, Security

With any migration or upgrade, challenges will arise. Windows 10 migration is no different – so be prepared.

Continue Reading...


If Video Killed the Radio Star, Will Process Automation Kill the IT Guy?

Written by Rory McCaw on Monday, May 21st 2018 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Windows 10, SCOM, SCCM, O365, Azure, Microsoft, Security

The most common type of Artificial Intelligence (AI) today is process automation, often referred to as Robotic Process Automation (RPA). Many IT guys (and, if you will, gals) fear that process automation will make their jobs disappear.

Continue Reading...


Server Patching Automation – Just Like an IT Caddy, Only Better

Written by Angie Anderson on Saturday, April 28th 2018 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Windows 10, SCOM, SCCM, O365, Azure, Microsoft, Security, Software Development

Let’s be honest, most of us who play individual games like golf are cheaters. We don’t play by the rules of the game 100% of the time. OK, labelling ourselves cheaters may be a harsh indictment of our collective scorekeeping.

Continue Reading...


Enable DKIM in Exchange Online Protection

Written by Muditha Chathuranga on Wednesday, July 19th 2017 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Windows 10, O365, Azure, Microsoft, Security

Last year Microsoft announced support for DomainKeys Identified Mail (DKIM) signing for outbound emails in Office 365. If you are wondering what DKIM is, below is an excerpt from Microsoft blog describing what DKIM is in its simplest form.

Continue Reading...


Windows Defender - Advance Threat Protection

Written by Rory McCaw on Monday, June 26th 2017 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Azure, Microsoft, Security

Microsoft has developed the most amazing defense to Advanced Persistent Threats (APT’s) in the form of two technologies: Windows Defender – Advanced Threat Protection, to protect your Windows 10 endpoints, and O365 – Advanced Threat Protection, to protect your 0365 environments.

Continue Reading...


How do I protect my Office 365 users from malware and phishing?… What you need to know!

Written by Angie Anderson on Friday, June 23rd 2017 — Categories: Solutions, Technology, Enterprise Advisory Services, Cloud, Windows 10, O365, Azure, Microsoft, Security

Office 365’s adoption is growing at the speed of light, and that means that it is also growing as an attack vector. Combining this with the growth in email-based malware and phishing attacks we need Microsoft to step up to the plate and protect us, and of course, they have!

Continue Reading...

Chat Now