If you were to ask me to pinpoint the exact moment of IBM’s downfall and the great rise of Microsoft, it would be in the room in Armonk, New York where the IBM developers and the Microsoft developers were trying to create a new operating system for the new IBM-AT (based on the 16-bit 80286 … Continue reading Busting the Myth: Windows 11 Hardware Requirements
**DISCLOSURE: While I am contracted to Microsoft Corporation, I am not an employee. The articles that I write are not meant to represent the company, nor are they meant to represent me as an employee or spokesman for the company. As has always been the case, all articles on this website represent me and nobody … Continue reading Conditional Access Policies in Intune
I have received a lot of spam in my day, and I have looked at some of it to see what tricks the bad guys are playing. I received this e-mail on my phone this morning. Please note, it was in my Inbox, and did not go into Junk. Does Microsoft use contractions? You’ve in … Continue reading Trusted Senders…
One of my pet peeves when walking through organizations that I consult for is seeing unlocked and unattended workstations. I hate seeing this, knowing that anyone can sit down at their desk and do... whatever. I know people who would sit down at these unlocked workstations, and send an e-mail to the entire organization (in … Continue reading Dynamic Lock: Walk away securely.
I can’t believe it has been two years since I signed up for my password vault, but there it was in my mailbox… the reminder that it is time to renew my ‘premium’ service with my password vault service. I did it gladly, giving over my credit card information. Why premium, you ask? Well, for … Continue reading Password Vault: Success!
For the past several years nearly every client of mine (that I have consulted on Active Directory) has been introduced to the Microsoft Security Compliance Manager (SCM), a great tool that helped create Group Policy Objects (GPOs) for any number of Organizational Units (OUs), including Default Domain Policy, Domain Controller Policy, Client Workstation Policy, and … Continue reading SCM is gone… Say Hi to SCT.
(NOTE: This article was written December 7, 2016. Not one word has been changed since that date. To understand why it can only now be published, read the article on this site called 107 Days: A Microsoft Security Nightmare. -MDG) For reasons that will become obvious, I am going to delay posting this article until the … Continue reading A Big, HUGE Microsoft Security FAIL.
I have held off talking about something for quite some time. I do not mess around when it comes to security, especially for my critical accounts. When the actual security of an account has been compromised, as was the case with my Microsoft Account, I do not advertise it. On December 7th I sat in … Continue reading 107 Days: A Microsoft Security Nightmare
A few weeks ago I wrote about how I started using a password vault. Some of my keener observers noted that I did not mention which one I chose, and that was not an oversight. I am not an expert in the technology, and unlike many of the products and solutions I have reviewed over … Continue reading Higher Security: How’s it going a month in?
I held out as long as I could; I have never used a password vault, thinking that I could remember all of my passwords for several dozen sites and applications without having to trust them to any third party. Of course, many of the passwords I used were reused a few times, and oftentimes I … Continue reading Passwords: Beware
This is NOT an article about my mother. She just happens to be the person at the other end of this conversation, but it could have been any house guest. My mother has been staying with me for the past few days. It is the first time she has stayed with me, and it has … Continue reading Sharing Passwords
Congratulations. You have decided to implement a Folder Redirection policy on your domain. There are real advantages to this, not the least of which is that all of your users’ profile folders will get backed up centrally… and that when they change computers their files and settings are just there. You have created a Group … Continue reading Folder Redirection: Where’d these warnings come from?
I was sitting in a planning meeting with a client recently in which we were discussing ways of protecting end-user machines, especially laptops that were in and out of the office. The previous convention relied on BIOS locks that were proprietary to the hardware manufacturer, and required the end user to either enter two passwords … Continue reading 1-2-3-4-5 BitLocker 9-8-7-6-5
Many of you know that I am a fanatic about changing passwords and password complexity. I have written time and again about the subject. (See Pass the Word…) I am also a big hater of what my friend Dana Epp refers to as ‘Security Theatre.’ I have often berated people at Rogers, AT&T, and a … Continue reading Passwords Revisited… a post from a fellow MVP
How often do you change your online passwords? If you are like the vast majority of us then the answer is not nearly often enough. Until recently I fell into the same category, and fixing that took a little bit of doing. One day several months ago I looked at Theresa and said ‘I think … Continue reading Pass the Word…