Protect Azure Resources from Accidental Changes and Deletion
A topic that comes up often in conversations about the Cloud is “How do I protect Virtual Machines and other Cloud resources from accidental deletion?”. Microsoft Azure provides a simple and effective way for Administrators to do this through “Locks”. When combined with other administration best practices, like backups, Locks allows administrators to ensure resources […]
Cisco FirePOWER: The Answer to Your Security Needs
In today’s network data center environment, it’s not simply enough to have a traditional firewall in place protecting the network’s edge. With more sophisticated network intrusions occurring daily, a Next Generation Firewall (NGFW) is required to help fight against these intrusions. Cisco’s FirePOWER services provides a Next Generation Firewall (NGFW) and IPS (NGIPS) along with […]
How Strong are Your Passwords?
Recently, I learned of a significant – and honestly quite brilliantly executed – security breach of a major company. The breach infiltrated a sophisticated system secured with some great security equipment. This company invested large sums of money to make their system very secure, and they accomplished that. But the brilliant hackers thought outside the […]
Remove-AzureRmADApplication: Deletion of multi-tenant application is currently not supported
If you’re a developer that is constantly trying out new things, you may want to clean up old and unused Microsoft Entra ID (formerly Azure AD) applications in your development tenant. In my case, I wanted to remove every single one, which is the very simple one-line command with PowerShell: Get-AzureRmADApplication | Remove-AzureRmADApplication. If you use applications […]
Cisco Nexus 7K Design with Active/Active FEX
Back in November 2015 I wrote a post about FEX Topologies with the Cisco Nexus platforms, and at the time the Nexus 5K/6K line was the only model that would support the active/active FEX topology (FEX-AA), which was unfortunate in designing redundant connectivity for downstream devices. But with the release of NX-OS code 7.2 and […]
Is Email Your Largest Security Vulnerability? Office 365 Advanced Threat Protection Can Help!
What would you say is your largest security vulnerability? In a recent study sponsored by MalwareBytes and Osterman Research, 31% of ransomware attacks were via links in email and 28% were due to attachments. That is 59% of attacks originate in email. Traditional Anti-Virus and SPAM protection don’t go far enough to mitigate these risks. Modern […]
Meraki – The Stethoscope of your Network
It’s cold and flu season – people all over the country are visiting their doctors for relief from sneezing, coughing, and sore throats. Imagine how they would react if their doctor asked them to run a 100 yard dash with a stopwatch, compared their results to national averages and then declared them healthy. Most patients […]
Moving Quickly to SharePoint Online Using Sharegate
SharePoint Online is Microsoft’s cloud version of the server-based web application. It is rapidly becoming one of our favorite cloud productivity tools to deploy for customers. If you’ve been through the many phases of SharePoint over the years, you’ll know that the platform has grown immensely. This growth can be good for customers who can fully […]
Nutanix – Self Service Restore
Since Nutanix Acropolis Operation System 4.6, Nutanix has offered the Self Service Restore function for virtual machines running Nutanix Guest Tools. This feature allows VM admins to complete a recovery from the Nutanix data protection snapshots with minimal administrator intervention. There are a few ways to accomplish this, I will be walking you through using the […]
Advanced Disaster Recovery Made Simple – Zerto 5.0
Zerto is an industry leader in disaster protection and disaster recovery for virtual computing environments. With the recent version of Zerto 5.0 released, businesses can take advantage of advanced disaster recovery technology while also introducing simplicity and confidence in their ability to completely avoid or recover from disasters. Here are a couple examples of how recent eGroup […]