Microsoft Edge Security: Let’s keep going!

**DISCLOSURE: While I am contracted to Microsoft Corporation, I am not an employee. The articles that I write are not meant to represent the company, nor are they meant to represent me as an employee or spokesman for the company. As has always been the case, all articles on this website represent me and nobody … Continue reading Microsoft Edge Security: Let’s keep going!

Conditional Access Policies in Intune

**DISCLOSURE: While I am contracted to Microsoft Corporation, I am not an employee. The articles that I write are not meant to represent the company, nor are they meant to represent me as an employee or spokesman for the company. As has always been the case, all articles on this website represent me and nobody … Continue reading Conditional Access Policies in Intune

I Think… therefore, I am uncertain.

I spend a lot of time speaking with clients about their environments.  From time to time, my job is to ‘interview’ them, so that I can properly document their environments. Recently I was speaking with a couple of admins at a private sector company who were very proud of their environments.  They had hired a … Continue reading I Think… therefore, I am uncertain.

An Open Letter to Application Developers

Dear Developers, I want to thank you for continuing to build applications and programs and other software that makes my life better.  As an Infrastructure Specialist I feel my kind and your kind have developed a nice symbiosis over the years - I build the environments on which your solutions run, and you make my … Continue reading An Open Letter to Application Developers

The Shoemaker is No Longer Barefoot!

This post was originally written for the Canadian IT Pro Connection blog, and can be seen there at http://blogs.technet.com/b/canitpro/archive/2012/09/13/the-shoemaker-is-no-longer-barefoot.aspx. For years I have been espousing the need to and value of locking down client workstations in a corporate environment.  Part of the SWMI Story – the secure, well-managed IT infrastructure for which I named my … Continue reading The Shoemaker is No Longer Barefoot!

The Wonder that is TechEd

The quiet of the Exhibitor Hall is disturbed by the sounds of preparation.  To my left there is a crew frantically working to fix something with a carpet.  There is some hammering, more yammering, and the sounds of carpet tape being unfurled. To my right there are two security agents talking, but they are too … Continue reading The Wonder that is TechEd

Cover Your A$$ – Secure Your WiFi Now!

I honestly hate saying ‘I told you so.’ For years I have been telling everyone who will listen (and a lot of people who didn’t want to) about the importance of securing wireless networks.  I’ve told stories about the possible consequences, and have scared some of them into doing the right thing.  Unfortunately far too … Continue reading Cover Your A$$ – Secure Your WiFi Now!

A Do-it-Yourself SWMI? No sweat!

Ok, let's be honest.  We all know that we need to secure our Active Directory infrastructures, but many of us are not entirely sure how.  You may even know that Group Policy is a great tool to do it centrally, but with literally thousands of Group Policy settings available in Windows Server 2008 R2, where … Continue reading A Do-it-Yourself SWMI? No sweat!