I discuss my journey and personal achievements on Experts Exchange, while explaining the professional and educational benefits I have experienced as a Certified Expert. I have seen people of all skill levels find value on EE, whether it’s from submitting questions or teaching others.
Microsoft Teams has begun to roll out the much anticipated Background Effects feature. This article describes how to deploy a custom Microsoft Teams backgrounds to users by leveraging Active Directory Group Policy File Preferences
Remote Desktop Services setup guide for physical and/or virtual deployment. We've been building RDS environments in both all-in-one and TS/.RD Farm mode on Terminal Services and then Remote Desktop Services with RD Gateway in Server 2008. What follows are some of the key takeaways. Enjoy!
This is another small article in my Bitlocker article series. It is about encrypting virtual machines. The scenario that I am securing the VM against, is that an attacker has physical access to the host and is trying to read out the virtual hard drive of the guest systems.
Natural disasters, technical faults, human error—these are just a few factors that leave your IT systems vulnerable to failure. To ensure incidents like these don’t catch you off guard or put your team offline, emergency planning is a must.
The block of six octets of a MAC address represents a lot of challenges when it comes to reading, formatting, parsing, validation, and lookup of vendor information. The functions presented here let you read, generate, format, store, list, and report MAC addresses and derived BSSIDs for most tasks.
It is a common practice to join vCenter to Active Directory in order to enable AD logins and authentication to various virtual machines. However, there are times where this simple task fails. Fortunately, one of the most common reasons is due to an SMB1 issue and this describes how to resolve it.
In this article, I will show you how delegation of control for Bitlocker recovery passwords in Active Directory is supposed to work using the common wizard, and why I think that you should do it differently.
In this article, will demonstrate how to deploy standalone RD gateway server on 2012 R2 server without deploying RDS infrastructure. RD Gateway is a built-in windows server role and allows RDP to internal servers from the internet through the Https tunnel.
As a network administrator, you have been probably requested to propose a secure and stable solution for branch offices connectivity to your HQ building over VPN. You possibly have usage scenarios such as IP phone, Cameras, Database replication, and remote maintenance and support.
This article explains SHA1 to SHA2 migration requirements in a simple way by putting all data on table, while explaining SHA1 and SHA2 algorithms, SHA1 deprecation plans and possible migration paths to SHA2.
Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.