Conditional access is a very powerful tool for increasing security of your cloud services. However, full conditional access is...
Welcome to my blog! If you're looking for tutorials, hints or tips for IT, you're right here. You will find mostly articles on Microsoft products and technologies - operating systems, servers, virtualization, networks, management, but also the cloud. Sometimes I add some other interesting things.
Office 365 offers eDiscovery, which is the search for information across the tenant. This enables selected users to search virtually all the data in Office 365, which means, for example, user mailboxes. This is useful when it is necessary, for example, to search for some information for a courtroom. For some larger organizations, [...]Lukas Beran
Meltdown security issue (CVE-2017-5754) applies to all Intel processors since 1995, except for older Intel Atom processors and Itanium processors. This processor error causes ability to read privileged memory, which is a very significant security risk. Second security issue Specter (CVE-2017-5753 and CVE-2017-5715) applies to all Intel, [...]Lukas Beran
DMARC is together with SPF and DKIM another technology protecting you against phishing and spoofing. Implementing DMARC with SPF and DKIM provides additional layer of protection. This validation uses DNS records where are specified mail servers authorized for sending emails from your domain. Differences between SPF and DMARC The [...]Lukas Beran
Live migrations allow to migrate running virtual servers from one Hyper-V host to another. Live migrations are not load balancing nor failover clustering, it’s just moving a VM from one host to another requested by admin for example when you buy another host and you want to distribute the load. How to allow Hyper-V live […]Lukas Beran
Multifactor authentication (MFA) in Office 365 is an option how to dramatically improve security of the Office 365 tenant and therefore all users and data. Thanks to multifactor authentication in Office 365 it is not enough to only know user’s password, but each and every login attempt has to be verified via user’s phone [...]Lukas Beran