
Dan Franciscus | | Automation | Security
Before Windows Server 2008, Active Directory password policies were done with default domain group policy, and there could only be one policy for an entire Active Directory domain. This is very limiting if users would like to give different policies to different users,...
How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached?
Adam Bertram | | Automation | IT Insights
Everyone has a morning routine that proceeds nearly the same way every day. We get up, brush our teeth, take a shower and put our clothes on. Every morning, this predictable routine repeats itself. It's like clockwork. It rarely, if ever changes. Think of your morning...
Michael O'Dwyer | | Automation | Security
We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked.
Adam Bertram | | Automation | Cloud | IT Insights | Security
When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.
Greg Mooney | | Automation | Security
Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.
Jeff Edwards | | Security
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
Dan Franciscus | | IT Insights
On any given Chocolatey client, packages are going to be installed primarily from a remote repository. Although you can actually install a package located on your local machine, centralizing usually makes much more sense from a design standpoint. This remote repository...
Dan Franciscus | | IT Insights | Security
Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by...
Adam Bertram | | Automation | IT Insights
One of Pester’s useful features is the Tags feature. A tag allows a developer to organize their tests based on different criteria and execute those tests accordingly. Tags allow a developer to manage large test suites that may take hours to run by only executing certain...
Unfortunately, stress is an inevitable aspect of any IT job. Deadlines start piling up, resources are stretched thin and before you know it, your cholesterol levels read more like a lopsided basketball game than a healthy screening. For sysadmins, managing the stress in...
Jacqueline Lee | | IT Insights
There's a truth that people applying for IT jobs need to keep in mind: most recruiters know next to nothing about IT. You'll get a blank stare when you ask them, "What is A+ certification?"
Dan Franciscus | | IT Insights
Chances are if you are managing servers in an organization, you have also had a lot of experience managing SSL certificates. Practically any web server should be communicating over HTTPS to clients if you want to make it secure, which means you have to deploy an SSL...
Creating excellent PowerShell scripts is one thing, but sharing them with others takes them to a whole new level! One of the best ways to improve your PowerShell skills, share your scripts with the community, and make your work known is by publishing scripts to the ...
Adam Bertram | | Cloud | IT Insights
Lab environments are essential to lots of people in IT, including system administrators needing to test out the latest software or software developers needing to deploy their own custom software to test before rolling it out to production.
Jeff Edwards | | Cloud | IT Insights
We're excited to announce that MOVEit Automation can now access Amazon S3 (Simple Storage Service) buckets as native hosts!
In Azure automation, there exists a useful feature called Variables. Variables are assets in Azure Automation that allow you to set and query various values.
Jeff Edwards | | Cloud | IT Insights
One of the main goals of MOVEit Managed File Transfer, and Ipswitch as a whole, has been to help IT teams work more efficiently.
Here is a quick and easy way to remotely log off end users who are still logged into their computers. This is especially useful when you are trying to do maintenance.
Greg Mooney | | Cloud | Security
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.