Quantcast
Channel: Secure Infrastructure Blog
Browsing latest articles
Browse All 408 View Live

Image may be NSFW.
Clik here to view.

How to enable Internet and vNET connectivity for nested VMs in Azure

For a full walk-through of this setup, please watch the video at the end of this post. Greetings readers, Hyper-V nested virtualization in Azure has unlocked different scenarios and use cases such as...

View Article


Image may be NSFW.
Clik here to view.

Configuration Manager – How Updates install during a Maintenance Window.

This is a question I have had since I started with SCCM 2007. I thought I had a grasp of it until I was talking with a customer and started second guessing myself. Why aren’t all my updates installing...

View Article


Image may be NSFW.
Clik here to view.

Setup Hybrid Azure AD Join – Part 1

In addition to users, device identities can be managed by Azure Active Directory as well, event if they are already managed by your on-premise network. This two part series will walk you throught the...

View Article

Image may be NSFW.
Clik here to view.

Setup Hybrid Azure AD Join – Part 2

Welcome back to the second and last post to setup hybrid Azure ad join. Hopefully all went well with configuring Pass-Through Authentication. Below you will find a link back to part 1. Configure...

View Article

Cleaning Up the Mess in Your Group Policy (GPO) Environment

Intro Group Policy is a great way to enforce policies and set preferences for any user or computer in your organization.However, anyone who managed Group Policy knows it might become very messy after...

View Article


PowerShell: Active Directory Cleanup – Part 3 – Stale Computer Objects

Introduction Hello everyone. Part 3 in my AD Cleanup series is stale computer objects. Stale computer objects are computers that haven’t logged into the domain for a specified number of days. This...

View Article

Image may be NSFW.
Clik here to view.

AppLocker – Part 3

Introduction:In the previous blog we looked at the AppLocker Rules, Rule Conditions and how to enforce them. In this blog we will look at AppLocker in audit mode. By using the Audit only enforcement...

View Article

Image may be NSFW.
Clik here to view.

ConfigMgr 101 – Understanding Backups (Part 1)

This will be the first part of a new series of posts, regarding different topics in ConfigMgr.ConfigMgr can be a daunting product to use, and especially to someone new to the product (or even some old...

View Article


Image may be NSFW.
Clik here to view.

ConfigMgr 101 – Understanding Backups (Part 2)

This will be the second part of a new series of posts, regarding different topics in ConfigMgr.ConfigMgr can be a daunting product to use, and especially to someone new to the product (or even some...

View Article


PowerShell: Active Directory Cleanup – Part 4 – Unsupported Windows Operating...

Introduction Welcome to part 4 in my Active Directory Cleanup Series. This part is concentrated on pulling a report of Windows Operating Systems that are obsolete/unsupported. Using this report you...

View Article
Browsing latest articles
Browse All 408 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>