Articles In Infrastructure

By Ed Bratter, Posted in Infrastructure

If you are confused about Azure AD hybrid join, what it is, when to use it, and how to set it up - keep reading. Azure AD hybrid join is for Windows devices and is one of three methods to associate devices to Azure AD: Azure AD registered, Azure AD joined, and Hybrid Azure AD joined. This article focuses exclusively on Azure AD hybrid joins and for organizations that use either pass-the-hash (PTA) authentication or pass-through-authentication (PTA). If you are using federated management via AD FS or third-p... read more.

  • January 27, 2023

By Michael Hawkins, Posted in Infrastructure, Security

In Part 1 of this series, we began talking about best practices for firewall policy rules that are applied to outbound access to the Internet. In Part 2, we’ll briefly discuss the human element and then circle back to actual policy prescriptions.  Effort vs Risk – The Human Element The firewall administrator is the person (or team) responsible for maintaining a secure firewall policy including the “outbound to Internet” rules. Sometimes the firewall admin role falls to a less... read more.

  • July 11, 2022

By Timothy Karl, Posted in Infrastructure, Security, Support, Virtualization

Citrix recently released the first new LTSR version of Citrix Virtual Apps and Desktops in over two years. Here is what I feel are the top 5 new features and enhancements available in 2203: #1 - Microsoft Teams Optimizations Citrix has added a lot of functionally to Microsoft Teams optimizations over the last two years that were until now only available in current releases. These new functionalities in the latest LTSR release include: App sharing Multimonitor screen sharing DTMF support Proxy server... read more.

  • April 15, 2022

By Gotham, Posted in Infrastructure

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. SUMMARY  A manufacturing customer of Gotham’s has over 100 years of experience tailoring custom products to meet their customers’ most demanding specifications. They pride themselves on the ability to provide any size order, to any specification, in a wide variety of configurations, and shipped on-time, worldwide.  The customer work... read more.

  • October 22, 2021

By Gotham, Posted in Infrastructure

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. SUMMARY  A manufacturing customer of Gotham’s has over 100 years of experience tailoring custom products to meet their customers’ most demanding specifications. They pride themselves on the ability to provide any size order, to any specification, in a wide variety of configurations, and shipped on-time, worldwide.  The customer work... read more.

  • October 22, 2021

By Timothy Karl, Posted in Infrastructure, Storage, Support

One of the common issues I see in VDI are FSLogix profile disks taking up a lot of space. Users’ profiles grow organically over time as they use VDI. If an IT administrator doesn’t monitor and perform regular maintenance on the profile shares, they can run out of space. When this happens, users are unable to log on and active profiles start to become corrupted. Adding more storage can temporarily get things back online; however, that might not always be an option as adding more storage and expan... read more.

  • September 16, 2021

By Nancy Rand, Posted in Infrastructure, Security

On August 5, 2021, the PCI DSS Council and the Cloud Security Alliance (CSA) issued a joint statement on the importance of cloud scoping. https://www.pcisecuritystandards.org/about_us/press_releases/pr_08052021 https://www.pcisecuritystandards.org/pdfs/PCI_Cloud_Security_Alliance_Cloud_Bulletin.pdf Best practices focus areas are discussed: Data protection, Authentication, Systems management, DevOps & DevSecOps, Data governance and Resiliency. These best practices are important to the security of clou... read more.

  • September 02, 2021

By Ed Bratter, Posted in Infrastructure, Security

One of the benefits of Microsoft 365 is the ability for users to collaborate and share with co-workers, clients, vendors, partners, and people external to the organization. This benefit, however, comes with a downside; users can either purposely or inadvertently expose information that the organization would not want shared externally.   To complicate matters, newly established tenants leave the door wide-open for publishing data to external entities. As a result, users can share data with outside ind... read more.

  • July 27, 2021

By Timothy Karl, Posted in Infrastructure, Security

With anti-malware scanning software it is very important to have the proper malware exclusions in place. A misconfiguration of these settings may lead to performance issues which can may cause outages of critical applications and services due to file contention and locking. IT administrators need to find a balance between a malware-free environment and affecting the reliability and performance of any applications or services. Anti-malware exclusions can come from a variety of sources. Each anti-malwar... read more.

  • July 02, 2021

By Nancy Rand, Posted in Infrastructure, Security

The Cloud Security Alliance released two new research documents to provide guidance on Cloud Incident Response and Consuming and Providing APIs. https://cloudsecurityalliance.org/artifacts/cloud-incident-response-framework/?utm_source=email https://cloudsecurityalliance.org/artifacts/security-guidelines-for-providing-and-consuming-apis/?utm_source=email Cloud Incident Response provides a framework for handling the lifecycle of a security incident in the cloud and discusses what information is shared inte... read more.

  • May 18, 2021