Browse by Tags

  • Blog Post: Step-By-Step: Enabling App Passwords in Azure AD with Two-Factor Authentication

    For some, passwords alone are not enough to ensure secure access to specific applications. In the Microsoft Virtual Academy video entitled Getting Started with Microsoft Azure Active Directory , I demonstrated how to turn on two-factor authentication with Azure Active Directory. However, what if you...
  • Blog Post: Top 3 Key Security Improvements Found in Windows 10 Technical Preview

    Security is in the eyes of the beholder. A quote which holds steadfast amidst the IT Professional community. While securing the core or datacenter is important to most IT administrators, security planning for client end software is equally important. Microsoft addresses this need ushering in its latest...
  • Blog Post: Device Management Strategy Planning: More Questions Than Answers

    Within the last few years, while in meeting discussing a Mobile Device Management (MDM) strategies , I have been frequently told the following by clientele when inquiring about business requirements: “I want to be able to do all my tasks on my iPad that I currently do on my desktop.” The...
  • Blog Post: Device Management Strategy Planning: Defining the Opportunity

    To this day, many organizations still struggle with regards to device management strategy. While email security is still a top priority, businesses are attempting to do more with these devices to further enable their employees. This post series entitled “Device Management Strategy Planning”...
  • Blog Post: Microsoft Intune Policies For Samsung Knox Enabled Devices

    While delivering last week’s CANITPRO Business Mobility Camp in Calgary, a question was brought forth in regards to what specific policies can be enforced on A Samsung KNOX enabled device via Microsoft Intune. For those unaware, Samsung’s KNOX offering is additional software & hardware...
  • Blog Post: Addressing Shadow IT Via Enabling Azure Active Directory Services

    The age of Shadow IT was introduced not so long ago via the plethora of devices (smartphones / tablets / notebooks) brought by employees into their respected organizations. With employee hopes of being able to use said device to address both work and personal needs all but dashed by IT’s possible...
  • Blog Post: Windows Server 2012 R2: Reducing The Attack Footprint Through Features On Demand

    Windows Server 2012 R2, when deployed in core mode , provides the smallest installation footprint thus thwarting attacks via the GUI and other payloads not installed in this instance. Core mode is not for everyone, and while it is possible to add GUI functionality, some still prefer the familiarity of...
  • Blog Post: What is Azure Rights Management?

    Azure Rights Management Services (RMS), newly added to Microsoft’s Enterprise Mobility Suite, enables the ability to help protect sensitive company information by controlling how said information is used and to block unauthorized access. The service uses identity, encryption, and authorization...
  • Blog Post: Hacker or Defender?

    I’ve always had the belief that in order to really understand something you have to break it and then fix it. Well maybe not break it but take it apart at least :) I really believe this when it comes to security. If you don’t know what threats are out there, how can you protect against them? If you don...
  • Blog Post: Another Launch?

    Yes, indeed, we have another launch. Today, May 2nd 2007, is the launch day for System Center and Forefront tools. Some of these tools have RTM'd already and some are set to in the near future. On the upcoming Future of the Server Room tour Rick and I will be talking about System Center Operations Manager...
  • Blog Post: Patching – how do you cope?

    Patching is a necessary evil. A lot of IT pros don’t like to talk about patching due to the amount of work it can generate for them in their already PACKED jobs. It came up as a heated topic of discussion at a user group event I attended a while back – so much so, I decided to produce a monthly podcast...
  • Blog Post: Off to the MVP Summit

    It maybe a quiet week here at the Candian IT Professionals blog with Damir starting out on the Unify Tour and myself heading down to Redmond for the MVP Summit so in order to keep you occupied for the week I'm going am posting some links to the videos I've dropped on my Zune to watch on the plane. Now...
  • Blog Post: Test Your Skills at Defending Your Data Center

    A little while ago I got an email from a friend of mine who works at Dell Canada. It talked about a game they developed in conjunction with us (Microsoft) and Intel that allows you to test your skills and knowledge at protecting a data center from security and other threats. The new Data Center Defender...
  • Blog Post: Hyper-V versus VMware: Virtual Disk Security

    Another great email came across my desk from Jeff Woolsey, Principal Program Manager at Microsoft for Windows Server, along with Yoganand Rajasekaran, one of our development team members and Ben Armstrong, the Virtual PC guy . This time the discussion is regarding access to other customer’s data across...
  • Blog Post: [Guest Blogger] Top 10 Security Mistakes

    I saw Brian Bourne give this presentation at Energize IT and asked to have it written up as a guest blog post. Over the past few years his company, CMS Consulting, has been doing security audits and this lead to their list of top 10 mistakes. -------------------------------------------------- 1...
  • Blog Post: Help Protect Your Friends And Family From Phone Scams

    A few weeks ago, I was surprised to get a call from Microsoft offering to help “fix my window”. This was surprising because: My window wasn’t broken and having worked at Microsoft for a while, I’m pretty sure we don’t do home repairs. Microsoft doesn’t...
  • Blog Post: [Guest Blogger] Kai Axford on Computer Security

    Graham Jones (Surrey, British Columbia, IT Pro) Last week we were very fortunate to have Kai Axford (CISSP, MCSE-Security) do a Western Canada sweep hitting Calgary, Edmonton, Vancouver and Victoria UG’s. Kai Axford (CISSP, MCSE-Security) is a Senior Security Strategist in the Trustworthy Computing...
  • Blog Post: [Podcast] Kevin Coleman - From Social Engineering to Cyberwar

    This is the last podcast in the series from my time at SecTor. Kevin Coleman was the Chief Strategist at Netscape before becoming a Senior Fellow and Strategic Management Consultant with the Technolytics Institute – an executive think-tank. When Kevin talks security he is talking high level and on a...
  • Blog Post: The Black Art of Security

    Security. It is on the minds of more and more people these days as evident by the large draw of the My TechNet Security Tour, the coverage in the press, and conversations with other IT professionals in Canada. Security is important. One of the challenges with security and building a secure network is...
  • Blog Post: Cloud interview–Canadian perspective. My IT Pro Spin.

    A good friend of mine, John Weigelt, National Technology Officer for Microsoft Canada had an interview with Mary Allen from http://itincanada.ca about cloud computing and what are points to know about the good ol’ US Patriot Act, Canadian PIPEDA and security/privacy in cloud environments. The article...
  • Blog Post: The “SQL Guy” Post # 30: How to Recover from a Lost SA Password in SQL Server 2012

    Working at Microsoft provides many opportunities to receive pearls of wisdom from individuals at other parts of the organization.  Saleem Hakani sent along this little gem a few days ago and I wanted to share it with you.  It outlines how to recover an SA password if you forgot it – though...
  • Blog Post: Security Bulletins for the Regular IT Guy #34, September 2011

    Over pints Pierre Roman, Bruce Cowper and Rick Claus decided they would put together a concise and timely podcast each “Update Tuesday”. The object is to keep it simple by letting you know in plain non technical language what the updates are, what they resolve and why you should care. ...
  • Blog Post: Online Safety is Your Concern

    Are you a father, mother, brother, sister, uncle, aunt have friends, neighbors or know someone with kids?  Chances are you are or do, so when I say online safety is something that should concern all of us, whether you have kids or not, it shouldn’t be a surprise.  One of the challenges is with...
  • Blog Post: What I learned at SecTor!

    So SecTor 2009 wrapped up the other day and again, like any conference I attend, a lot is learned. The event was success in my opinion, from the venue to the food to the keynotes and of course the sessions. Even the vendor area had some exciting things happening. So what did I learn? I am going to break...
  • Blog Post: Is Your DNS Patched?

    In case you have been living under a rock for the past month you have most likely heard about the DNS cache exploit recently discovered by Dan Kaminsky . This might be one of the most severe flaws discovered as it was cross platform affecting everything from Windows to Linux, UNIX, Cisco IOS etc.......