I have been talking over the past year about “Hardening Active Directory”. In those discussions, we have been talking about implementing a granular password policy so that you K-2 students have a lower password requirement than your financial and guidance users.
The October Tech Talk meeting was jammed packed with information. There was more information than time allowed us to present. Therefore, Scott is going to do a special November Tech Tidbits webinar presentation on Tuesday November 14th at 10:30 am.
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
The reality is that your network is under attack. The bad guys are using advanced machine learning techniques to exploit sometimes subtle vulnerabilities in your network implementation and design to gain a foothold inside your network. These footholds then use map the network, determine who the domain admin IDs are, who the local admins […]
The summer months are often very busy times as we try to get all our projects accomplished before school starts again. This month Scott Quimby will discuss summer priorities. There are so many important tasks that never seem to get done during the school year.
This month Scott Quimby continues his discussion of Microsoft Group Policy. He will focus on Microsoft Windows logon performance and reliability. There are a myriad of different settings that affect how long it takes the user to get to a functional desktop from the initial Windows logon screen.
Scott Quimby continues his discussion of Microsoft Group Policy. He will focus on the different ways to deliver items to an end user’s desktop. These include: Shared folders via a folder re-direction group policy. Delivering customized shortcuts via Group Policy Preference Extensions including Item Level Targeting strategies.