Browse by Tags

  • Blog Post: Step-By-Step: Building Windows 10 Provisioning Packages

    Standard practice for most IT administrators when migrating to a new client offering entails creating a baseline image of a desired client state. Next the IT administrator wipes the computer to be worked on to image it with the newly created client image. This procedure is not without it’s faults...
  • Blog Post: Step-By-Step: Enabling Multi-Factor Authentication on XBOX ONE

    Much of this week’s online news has been centered on the E3 event taking place in LA. Gamers, both passive and hardcore alike, have flocked to see what creativity publishers and console makers will unleash amidst gamer nation in the upcoming months. Microsoft’s XBOX E3 keynote was additionally...
  • Blog Post: Windows 10 Tips: Managing Universal Apps in an Enterprise Setting

    Windows 8.1, Love it or hate it, was intended to be both a desktop and device operating system. Regardless of how you feel about Windows 8.1, if you were tasked with managing it in you enterprise, there are a number of posts written to assist you in that task. Microsoft recently announced that client...
  • Blog Post: Windows 10 Tips: Joining a device to Azure AD

    Azure AD Join, similar to Domain Join, enables devices to be made visible in a directory to be managed and gain access to assigned resources. Windows 10 has the ability to register and authenticate directly with Azure AD without the requirement of a Domain Controller needed unless the respected IT administrator...
  • Blog Post: PowerShell Basics: List and Export Admin Roles Assigned to Office 365 Users

    One questions I frequently get asked: ”How do I list all the users that have global admin access to my tenant?” The information is viewable in the Office 365 Admin portal, by filtering the users by role. That way works for some clients, but other need the data to be exported and kept for...
  • Blog Post: Step-By-Step: Setup and Enablement of Office 365 Message Encryption

    Office 365 Message Encryption is an online service which is built on Microsoft Azure Rights Management (Azure RMS) offering. With Azure RMS set up for an organization, administrators can enable message encryption by defining transport rules that determine the conditions for encryption. A rule can require...
  • Blog Post: Step-By-Step: Enabling App Passwords in Azure AD with Two-Factor Authentication

    For some, passwords alone are not enough to ensure secure access to specific applications. In the Microsoft Virtual Academy video entitled Getting Started with Microsoft Azure Active Directory , I demonstrated how to turn on two-factor authentication with Azure Active Directory. However, what if you...
  • Blog Post: Top 3 Key Security Improvements Found in Windows 10 Technical Preview

    Security is in the eyes of the beholder. A quote which holds steadfast amidst the IT Professional community. While securing the core or datacenter is important to most IT administrators, security planning for client end software is equally important. Microsoft addresses this need ushering in its latest...
  • Blog Post: Device Management Strategy Planning: More Questions Than Answers

    Within the last few years, while in meeting discussing a Mobile Device Management (MDM) strategies , I have been frequently told the following by clientele when inquiring about business requirements: “I want to be able to do all my tasks on my iPad that I currently do on my desktop.” The...
  • Blog Post: Device Management Strategy Planning: Defining the Opportunity

    To this day, many organizations still struggle with regards to device management strategy. While email security is still a top priority, businesses are attempting to do more with these devices to further enable their employees. This post series entitled “Device Management Strategy Planning”...
  • Blog Post: Microsoft Intune Policies For Samsung Knox Enabled Devices

    While delivering last week’s CANITPRO Business Mobility Camp in Calgary, a question was brought forth in regards to what specific policies can be enforced on A Samsung KNOX enabled device via Microsoft Intune. For those unaware, Samsung’s KNOX offering is additional software & hardware...
  • Blog Post: Addressing Shadow IT Via Enabling Azure Active Directory Services

    The age of Shadow IT was introduced not so long ago via the plethora of devices (smartphones / tablets / notebooks) brought by employees into their respected organizations. With employee hopes of being able to use said device to address both work and personal needs all but dashed by IT’s possible...
  • Blog Post: Windows Server 2012 R2: Reducing The Attack Footprint Through Features On Demand

    Windows Server 2012 R2, when deployed in core mode , provides the smallest installation footprint thus thwarting attacks via the GUI and other payloads not installed in this instance. Core mode is not for everyone, and while it is possible to add GUI functionality, some still prefer the familiarity of...
  • Blog Post: What is Azure Rights Management?

    Azure Rights Management Services (RMS), newly added to Microsoft’s Enterprise Mobility Suite, enables the ability to help protect sensitive company information by controlling how said information is used and to block unauthorized access. The service uses identity, encryption, and authorization...
  • Blog Post: Off to the MVP Summit

    It maybe a quiet week here at the Candian IT Professionals blog with Damir starting out on the Unify Tour and myself heading down to Redmond for the MVP Summit so in order to keep you occupied for the week I'm going am posting some links to the videos I've dropped on my Zune to watch on the plane. Now...
  • Blog Post: Test Your Skills at Defending Your Data Center

    A little while ago I got an email from a friend of mine who works at Dell Canada. It talked about a game they developed in conjunction with us (Microsoft) and Intel that allows you to test your skills and knowledge at protecting a data center from security and other threats. The new Data Center Defender...
  • Blog Post: SecTor 2009

    It is almost that time of year again! Time to put on the black/white/aluminum foil hat and learn about the latest in security. I’ve said it before and I will say it again, you cannot protect against what you do not know exists. We recently finalized the speakers and here is a glimpse at what you can...
  • Blog Post: “Security Bulletins for the regular IT guy” Podcast – 6/11/2009

    Three guys got together over pints in February 2009 and talked about how one of the issues facing Technical Professionals today is keeping their systems patched and up to date. This issue was brought up to them at a User Group meeting they were attending ( Ottawa Windows Server User Group ) where we...
  • Blog Post: Windows 8: More beautiful, more flexible and more secure

    Hello folks, Windows 8 has been since October 30 th 2012. And a lot has been said about it. Some may love it as I do, and some may still need another look before being convinced. One of the many improvements in Windows 8 that has been “baked-in” is definitely the security enhancements...
  • Blog Post: [Guest Blogger] Top 10 Security Mistakes

    I saw Brian Bourne give this presentation at Energize IT and asked to have it written up as a guest blog post. Over the past few years his company, CMS Consulting, has been doing security audits and this lead to their list of top 10 mistakes. -------------------------------------------------- 1...
  • Blog Post: Help Protect Your Friends And Family From Phone Scams

    A few weeks ago, I was surprised to get a call from Microsoft offering to help “fix my window”. This was surprising because: My window wasn’t broken and having worked at Microsoft for a while, I’m pretty sure we don’t do home repairs. Microsoft doesn’t...
  • Blog Post: [Guest Blogger] Kai Axford on Computer Security

    Graham Jones (Surrey, British Columbia, IT Pro) Last week we were very fortunate to have Kai Axford (CISSP, MCSE-Security) do a Western Canada sweep hitting Calgary, Edmonton, Vancouver and Victoria UG’s. Kai Axford (CISSP, MCSE-Security) is a Senior Security Strategist in the Trustworthy Computing...
  • Blog Post: [Podcast] Kevin Coleman - From Social Engineering to Cyberwar

    This is the last podcast in the series from my time at SecTor. Kevin Coleman was the Chief Strategist at Netscape before becoming a Senior Fellow and Strategic Management Consultant with the Technolytics Institute – an executive think-tank. When Kevin talks security he is talking high level and on a...
  • Blog Post: The Black Art of Security

    Security. It is on the minds of more and more people these days as evident by the large draw of the My TechNet Security Tour, the coverage in the press, and conversations with other IT professionals in Canada. Security is important. One of the challenges with security and building a secure network is...
  • Blog Post: Cloud interview–Canadian perspective. My IT Pro Spin.

    A good friend of mine, John Weigelt, National Technology Officer for Microsoft Canada had an interview with Mary Allen from http://itincanada.ca about cloud computing and what are points to know about the good ol’ US Patriot Act, Canadian PIPEDA and security/privacy in cloud environments. The article...