Blog

The Presidential Executive Order On Cybersecurity

The United States Federal Government has in recent years passed parts of key bills that relate to the Cybersecurity of this country.  But probably the most comprehensive one was just recently enacted by President Joe Biden, in the Executive Order that he signed on May 12th, 2021, primarily in response to all of the Ransomware ...

Read More

An Introduction To Microsoft 365 GCC High

When many people hear of Microsoft Azure, they usually think of Cloud deployments for commercial usage, such as for businesses in Corporate America. But believe it or not, there are up to four different versions of this Cloud offering, and each one is designed to serve the unique needs of the customer base that is ...

Read More

What Is New With The Microsoft Azure Virtual Desktop

Microsoft Azure is well known for offering great cloud-based services for creating a hosted IT and Network infrastructure.  Probably one of its greatest strengths is the ability to create Virtual Machines (VMs) in just a matter of a few minutes.  Essentially, these are the servers that make use of the Windows Server OS. But there is ...

Read More

The New Microsoft Windows 11

Let’s face it, the Windows Operating System (OS) and all flavors of it have been with us for a very long time.  It has always been the predominant OS for both individuals and businesses alike, despite the strides made by other manufacturers such as Apple with the MAC OS.  The most current version of this ...

Read More

Is Your Microsoft-Based MSP Ready for The CMMC?

While you may be dependent upon your Managed Service Provider (MSP) to fulfill your M365 and Azure needs, at some point in time, they should also be CMMC certified. The primary reason for this is that since you are basically hosting all of your data with them, you will also need to make sure that ...

Read More

Trusted Platform Module (TPM) and Windows Features

The following table defines which Windows features require TPM support. TPM AND WINDOWS FEATURES Windows Features TPM Required Supports TPM 1.2 Supports TPM 2.0 Details Measured Boot Yes Yes Yes Measured Boot requires TPM 1.2 or 2.0 and UEFI Secure Boot. TPM 2.0 is recommended since it supports newer cryptographic algorithms. TPM 1.2 only supports the SHA-1 algorithm which is being deprecated. BitLocker No Yes Yes TPM 1.2 or 2.0 are ...

Read More

The End of Life For Skype

When people think of the term of video conferencing before COVID-19 hit, the first thing that came to mind was Skype.  This has been an institution in and of itself, with not only businesses, but literally millions upon millions of people worldwide depending upon this platform to communicate with family and friends for virtually pennies ...

Read More

Forrester and Gartner have Recognized Microsoft Security as a Leader

With Microsoft Security you can now get the best of both worlds. How so? Not only do they offer a way to streamline your security but also strengthen it with their best of breed security capabilities. Forrester Research has recognized Microsoft Security as a leader in 7 of its Forrester Wave™ reports. Security Analytics Platforms, Q4 ...

Read More

The Microsoft Identity Manager (MIM)

Today, many businesses in Corporate America are now implementing more than one level of authentication in order to confirm the identity of an individual.  Many of them have implemented at least Two Factor Authentication (2FA) or even Multifactor Authentication (MFA).  But trying to keep track of all of these authentication levels and mechanisms can be ...

Read More

How To Create A Playbook In Azure Sentinel – Part 2

In our last article, we examined the concept of what a Playbook is, and how to create one specifically for the Azure Sentinel platform.  Specifically, the following topics were covered; Creating the Playbook; Establishing The Trigger Point. In this article, we continue with theme of creating the Playbook, but looking at more advanced functionalities. How To Steps ...

Read More