-
Microsoft 365 & Active Directory Hard Matching
by
–
The content addresses the complexity of managing user identities across cloud and on-premises systems. It introduces the concept of “Hard Matching,” likening it to Jedi mind tricks and starship syncing. The process involves unifying cloud and on-premises identities using a script and emphasizes the benefits of moving to a full cloud setup. Additional resources and…
-
Setting Corporate Wallpapers and Lockscreens via Intune: A Complete Guide
by
–
If you’ve landed here, chances are you’ve been frantically searching Google, frustrated by Intune’s inability to define lockscreen and wallpaper […]
-
Securing Email Delivery with DKIM for Microsoft 365
by
–
In today’s business environment, securing email delivery is essential. Email remains the primary form of communication for most businesses, and […]
-
Deploying .NET Framework 3.5 via Intune
by
–
It happens to us all. You’ve got a nicely configured Intune setup, your applications are packaged and ready to go, […]
-
DKIM and DMARC: Your Email Security Dream Team
by
–
Let’s explore the world of email authentication with DKIM and DMARC, two indispensable tools for protecting your email domain. These […]
-
Importing Administrative Templates for Intune
by
–
Microsoft is always increasing the capabilities of Intune, and a great step forward has been the introduction of ADMX file […]
-
Automating Free SSL Encryption with Let’s Encrypt and the ACME Protocol
by
–
SSL encryption doesn’t have to be expensive, time-consuming, or both! In fact, it can be completely free and automated with […]
-
How CAA Records Protect Your SSL/TLS Certificates
by
–
A useful part of Domain Management & SSL Security, is ensuring only trusted certificate authorities (CAs) can issue SSL/TLS certificates […]
-
Why Inactive Computers Pose Security Risks
by
–
Security is a crucial element of any infrastructure, and while it may feel like a grind, it’s essential to embrace […]
-
How to Secure Inbound Emails with MTA-STS: Protect Your Mail Server from Man-in-the-Middle Attacks
by
–
Emails traveling across the internet typically use secure connections, known as Transport Layer Security (TLS). However, vulnerabilities still exist with […]