June 2025

Leveraging Azure Blob Storage for Your PKI Needs, Part 2: Automation

This blog post is a follow up to my previous post on leveraging Azure Blob Storage to serve HTTP certificate revocation lists (CRLs). If you have not already done so, you will want to check out that blog post first. I have demonstrated how you can serve CRLs and CA certificates from Azure Blob Storage. […]

Leveraging Azure Blob Storage for Your PKI Needs, Part 2: Automation Read More »

Common Active Directory Attacks (and How to Defend Against Them)

Microsoft’s Active Directory (AD)—released in 1999 as part of Windows 2000 Server Edition—is currently the most popular directory service for Windows domain networks. AD has evolved and matured over the years and is a central component of how many mid- to large-size Windows-based organizations manage their users, computers, and other resources. Partner with Microsoft experts

Common Active Directory Attacks (and How to Defend Against Them) Read More »

Best Practices for Implementing Windows Security Baselines

Maintaining security in a Windows environment is important to reduce the risk of bad actors being able to cause harm to an organization. Although Windows is built to be secure out of the box, enforcing security through policies is necessary to prevent configuration drift in organizations. Each iteration of Windows includes new security features that

Best Practices for Implementing Windows Security Baselines Read More »