We are looking at a new cloud based phone system. Most use Poly or Yealink phones, we use 802.1x on the network for ethernet access. Poly...
Continue reading...security
Microsoft ATP documentation
We’ve deployed ATP to our windows workstation, now I’m researching it for our MACs and IOS devices. I pushed it out to a test iphone today,...
Continue reading...How to move a certification authority to another server
We have to upgrade the OS for our cert servers. Grabbing documents I’m finding and dropping them here. How to move a certification authority to another...
Continue reading...Least privileged roles by task in Azure Active Directory
As we continue to improve our process and work through least privileged roles. I find this Microsoft doc to be very helpful when trying to find...
Continue reading...How to configuration SMB3 and encryption
We have not enforced SMB3 and encryption, but have now started a SOX review and need data copied between servers to be encrypted. Below is some...
Continue reading...Check bitlocker status from cmd
Type manage-bde -status to check the status for all drives.
Continue reading...Update Compliance Log Analytics
I’ve been trying to find good reporting on windows feature release and security updates using intune. Setting up compliance log analytics allows you to collect data...
Continue reading...Ad security assessment with powershell
4sysops.com/archives/perform-active-directory-security-assessment-using-powershell/ Here’s a great way to review your active directory security with actionable items to follow up on
Continue reading...Using PowerShell to add an authentication method to an Azure user
I had a need to setup MFA for a large group of users, I have all the users cell phones and I wanted to automate the...
Continue reading...Quick hit – intune gap analysis for conditional access
Need to check this out Tuesday at work https://twitter.com/markmorow/status/1446529020040941568?s=21
Continue reading...