In an Active Directory domain, we generally rely heavily on group policies. Microsoft best practices say that you should have at least two domain controllers. Most of our clients have two or more domain controllers. Those domain controllers need to replicate Active Directory information, DNS information, and Group Policy information (i.e. SYSVOL) so that everyone […]
This week’s Tech Tidbit is short and sweet. If you have a server or device that is internet facing, make sure you have a real, commercial SSL certificate on it. Do not use a self-signed certificate. I don’t really care that it is just for “internal” use and you are smart enough to bypass the […]
When all else fails we reach for the backups. However, increasingly the bad guys are consciously seeking out your backups and deleting them as part of elaborate ransomware routines to force you to pay to recover your data. This can be as simple as the bad guys deleting your volume shadow copies to as complex […]
One of the key features of the newest firewalls and intrusion protection systems (IPS) has been the addition of something called GeoBlocking. This feature allows the administrator to shut down traffic to or from specific countries or regions of the world and your local network regardless of any other firewall permissions in place.