[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[What we do]
[What our clients say]
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/06/AdobeStock_162398625-1024x684.jpeg)
“Ravenswood’s technical expertise, exceptional responsiveness, attention to detail, and willingness to go above and beyond have made collaboration seamless and enjoyable.”
Director, IT Global Security
Confidential Chemicals Manufacturing Client
[From the blog]
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/09/Banner-06-1024x375.png)
Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy
In a previous blog post , we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/07/Banner-10-1024x376.jpg)
Win32 App Deployment with Intune Supersedence Rules
There are several ways to deploy applications to users or devices that are managed by Microsoft Intune. In addition to application types, you must also
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/07/Banner-10-1024x376.jpg)
Manage Entra Groups with the Graph API
In my previous blog [Win32 App Deployment with Intune Supersedence Rules] I explained how to update Win32 applications deployed within Microsoft Intune by using the
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2023/04/Banner-02-1024x376.png)
3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless
In the past few years, we’ve seen a rapid expansion in remote and remote-hybrid workforces. Remote employees primarily use cloud-native services to manage their daily
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/05/Banner-03-1024x376.png)
Network Time Protocol Configurations: A Deeper Dive
In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2022/05/Banner-04-1024x376.png)
Active Directory Forest Recovery: Plan to Eliminate Downtime
Microsoft Active Directory (AD) is still the predominant identity and management platform for tens of thousands of organizations worldwide. Larger organizations with hundreds to even
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/09/Batch-2-header-designs-existing-icons-updated-2022_Opt5_062221-1024x376.png)
How to Build a Tier 0 Windows Admin Center Instance
Are you tired of seeing the Windows Admin Center (WAC) prompt from Microsoft Windows Server Manager (as shown in Figure 1) and not knowing what
![](https://www.ravenswoodtechnology.com/wp-content/uploads/2021/09/Batch-1-header-designs-new-graphics-updated-2022_Opt1_062221-1024x375.png)
How to Implement Microsoft Entra Password Protection for a More Secure Environment
Passwords have long been the de facto authentication mechanism for identities. Length and complexity plagued us as we struggled to produce an acceptable password that