Conditional access is a very powerful tool for increasing security of your cloud services. However, full conditional access is...
Meltdown security issue (CVE-2017-5754) applies to all Intel processors since 1995, except for older Intel Atom processors and Itanium processors. This processor error causes ability to read privileged memory, which is a very significant security risk. Second security issue Specter (CVE-2017-5753 and CVE-2017-5715) applies to all Intel, [...]Lukas Beran
SSTP VPN is modern and secure VPN which allows you to connect even through some firewalls because it uses TCP port 443 which is also for secure http (https). And moreover this VPN is very secure, much more than very popular PPTP which is currently not secure at all. Configure SSTP VPN on Windows Server is very simple and fast. You need [...]Lukas Beran
FSMO roles are five special roles on domain controller, which are vital for the smooth running of AD as a multimaster system, because some of Active Directory features require central authority to which can all domain controllers refer to. These roles are installed automatically and there is normally very little reason to move them, [...]Lukas Beran
SMB (Server Message Block), known also as CIFS (Common Internet File System) is network communication protocol for a communication between computer nodes. Primarily is used for a data transfers in a computer network. We know it as network drives (network shares or shared folders). Current version of this protocol is 3.1.1 and has been [...]Lukas Beran
If you want to save your time when deploying Windows 10, or if you want to deploy Windows 10 to more computers, it’s very useful to create your own Windows 10 image. For the creation we will use available tools from Microsoft – Windows ADK for Windows 10 and Microsoft Deployment Toolkit 2013 Update 1. […]Lukas Beran