
Network Time Protocol Configurations: A Deeper Dive
In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the
[blog]
Does securing your business keep you up at night? Sleep better staying in the know – read our experts’ unique takes on trends in cybersecurity.
In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the
Active Directory (AD) is still the predominant identity and management platform for tens of thousands of organizations worldwide. Larger organizations with hundreds to even thousands
Are you tired of seeing the Windows Admin Center (WAC) prompt from Microsoft Windows Server Manager (as shown in Figure 1) and not knowing what
Passwords have long been the de facto authentication mechanism for identities. Length and complexity plagued us as we struggled to produce an acceptable password that
Microsoft is disabling Basic authentication in an effort to improve data security in Exchange Online. Starting October 1, 2022, Microsoft will begin turning off Exchange
Are you ready to make the move to Azure Active Directory (AD) single sign-on (SSO)? Do you want to avoid the complications of federated authentication
In a previous blog series, I discussed how to use certificate authentication for PowerShell scripts running in a standard Windows environment. (See “Authentication Options for
You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of
In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their
Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew
The process of cleaning up your applications can be time-consuming but there are useful ways to report and manage applications in Azure.
[About Us]
Ravenswood Technology Group is based in Chicago, IL but with customers around the world. We help companies, universities, and other organizations with less than 100 employees to over 500,000 build secure, hybrid infrastructure that enable their users to work from anywhere.
[What we do]
[Recent Blog Posts]