The next version of Windows Server will feature a Server Message Block (SMB) authentication rate limiter designed to thwart brute force login attempts. It will insert a two-second delay between login attempts to do this, making brute force cracking completely impractical. This article describes how password brute force attacks work, existing countermeasures, and Microsoft’s latest SMB solution.
The DevOps engineer role is gaining popularity. Companies expect you to know the software application lifecycle end-to-end. To compete within the industry, you’ll need to have the necessary skills to excel in your role. In this article, we’ll cover the main platforms you need to know, CI/CD and Infrastructure as a Code (IaaC) tools, and talk about integrating QA into your DevOps processes.
UAC virtualization protects your device from malware and other malicious programs while at the same time, providing access to software to run efficiently. It achieves this balance through an abstraction layer where changes are made only to user accounts and not to global registry variables or core Windows components. In this article, we will learn about UAC virtualization, how it works, and whether you need it at all.
This article describes a major Exchange 2013-2019 server patch that caused Exchange databases to be deleted. This article describes to the reader what this issue was and how it managed to impact production servers. Finally, ways to test updates and patches are discussed along with best practices an administrator can use.
This article shows how Office 365 users and licenses can be managed by a cloud-based active directory. This is useful for hybrid networks that want to leverage license access from anywhere in the world. Here Active directory migration, Office 365 licenses and migration through PowerShell scripts are discussed.
Protection of Exchange servers in the organization is key. Update your firewall rules to ensure that the EAC is not accessible from the outside.This article describes Intrusion Prevention Systems (IPS) and how they can play a role in your business. It defines how they differ from similar technologies like intrusion detection systems (IDS) and firewalls. It further provides examples of different IPS solution types.