Get more with Hybrid Azure AD Join
It was only until recently that I realized the usage of Hybrid Azure AD Join (HAADJ) is sparser than I expected. Digging a bit more on why this is…
It was only until recently that I realized the usage of Hybrid Azure AD Join (HAADJ) is sparser than I expected. Digging a bit more on why this is…
Ever stumbled upon the repetitive Shutdown Event Tracker pop-up message following an unexpected shutdown? This could happen on some occasions in Windows Server 2016 and Windows Server 2019 releases and…
Nearly all organizations own some NAS device that they can use for various purposes. Firstly, as a backup destination which is the most common usage. Secondly, as a Web Server…
Secure server configurations often appear to puzzle IT professionals, while it sometimes can be a headache trying to change things around without interrupting the business flow. We can apply the…
In this post; we go through the steps required to enable Azure replication for our on-premises Hyper-V Virtual Machines. We will utilize Azure Site Recovery (ASR) for that purpose; one…
Migration to Office 365 Exchange Online has been around since the early stages of cloud adoption. Most of the times it has been used as the stepping stone for organizations…
In this post; we are going to see how to significantly enhance security on a Citrix NetScaler appliance. We will go through all steps required to get an A+ rating…
Background Nearly before Christmas 2019, Citrix publicly announced the CVE-2019-19781 vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliances that could lead to arbitrary code execution;…
In this post; we discuss how to better safeguard our infrastructure by following the "Reduce Attack Surface Approach. This model gets increasingly adopted by organisations worldwide. Its main assertion is…