Advanced search


Strictly by the Book  

Configuration and security of authorization assignment and access control by Entra ID, formerly Azure Active Directory, requires careful consideration. We reveal how configuration as code works with PowerShell and Microsoft 365 DSC for tenant configuration in Entra ID.

Sophisticated Heist  

A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.

Unboxing  

Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.

Automatic  

Construct Kubernetes clusters from the Azure CLI in a consistent and predictable manner across every environment.

Load Carrier  

Setting up and making the most of network load balancing on Windows Server 2019 and 2022.

Power Duo  

This comprehensive guide shows you how to merge the cross-platform capabilities of Ansible with PowerShell's robust Windows management features.

Gardening  

Your Active Directory system doesn't have to be a walled garden. A few easy steps are all you need to integrate Linux with AD.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.