thomas

Oh no! The Domain Admin password was reset using a guide some idiot posted! What do I do?? [Part 2]

Last time(!), some dastardly devil wrote a Part 1 guide on how to reset your administrator password via the On-Screen Keyboard and despite: It being a handy workaround for forgetful people; and Microsoft treating this as an acceptable risk …it is still pretty stupid. And, so, a colleague of mine asked the blindingly obvious… How do you…

Read More

Azure AD Connect: Your first step towards an Hybrid Windows Environment

In this, my latest and straightest, blog post! We’ll start setting up a Hybrid Active Directory lab environment starting with the whats, whys, hows, and whos (?) of the Active Directory Connect tool!  Let’s be honest with ourselves. On-premise set-ups aren’t going away anytime soon and Hybrid is here to stay for the foreseeable future….

Read More

Group Policy Administrative Templates (ADMX): What are they? How are they used? And what if I need to update them?

Group Policy Administrative Templates are registry-based policy settings and provide an XML-based structure for defining the display of administrative template policy settings in the Group Policy Editor. Now I know the name of this blog is Thomas’ head in the cloud so why all the focus on on-premise tech? It’s because understanding how these templates…

Read More

Defender for Endpoint on macOS – Security Center Actions

 MDE for Mac currently includes preventive antivirus capabilities and reporting via Microsoft Defender Security Center. The following document regards the latest Public Preview build of MDE. Defender for Endpoint endpoint detection and response capabilities provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full…

Read More

Defender for Endpoint – What is it? And how do I on-board Windows Devices?

Ransomware is one of, if not the most, dangerous threat to organizations, and smaller businesses sometimes lack the resources to implement a security solution. Cyber attack threat scenarios have become more complicated than ever. Organizations with limited resources attempt to keep up with the going-ons while ensuring they have a zero-trust security policy that adapts…

Read More