I have my lab in Azure, where I run about 10 virtual servers with Windows 10 and Windows Server. And there is also one web server...
Welcome to my blog! If you're looking for tutorials, hints or tips for IT, you're right here. You will find mostly articles on Microsoft products and technologies - operating systems, servers, virtualization, networks, management, but also the cloud. Sometimes I add some other interesting things.
I have my lab in Azure, where I run about 10 virtual servers with Windows 10 and Windows Server. And there is also one web server running Ubuntu 18.04. So far I have handled updates manually, so I had to log on to all servers, check for updates, install updates, restart. But Azure Update Management […]Lukas Beran
Office 365 offers eDiscovery, which is the search for information across the tenant. This enables selected users to search virtually all the data in Office 365, which means, for example, user mailboxes. This is useful when it is necessary, for example, to search for some information for a courtroom. For some larger organizations, [...]Lukas Beran
Meltdown security issue (CVE-2017-5754) applies to all Intel processors since 1995, except for older Intel Atom processors and Itanium processors. This processor error causes ability to read privileged memory, which is a very significant security risk. Second security issue Specter (CVE-2017-5753 and CVE-2017-5715) applies to all Intel, [...]Lukas Beran
DMARC is together with SPF and DKIM another technology protecting you against phishing and spoofing. Implementing DMARC with SPF and DKIM provides additional layer of protection. This validation uses DNS records where are specified mail servers authorized for sending emails from your domain. Differences between SPF and DMARC The [...]Lukas Beran
Multifactor authentication (MFA) in Office 365 is an option how to dramatically improve security of the Office 365 tenant and therefore all users and data. Thanks to multifactor authentication in Office 365 it is not enough to only know user’s password, but each and every login attempt has to be verified via user’s phone [...]Lukas Beran