Blog
This is my blog section. Here all new blog posts will be showed in reverse-chronological order. Just a fancy way to say newest-top.
At the left, you can view the categories, and on the right you can find the tags and Table of contents.
Managing Hyper-V server without Active Directory
Tuesday, December 17, 2024 in Windows Server
Categories:
When you use Hyper-V server, you want to manage this with the management tools. However, by default Hyper-V only allows connections from domain-joined machines by design because of security and trust reasons. We can bypass this requirement by …
Set a domain alias for every user in Microsoft 365
Friday, December 13, 2024 in Microsoft 365
Categories:
Sometimes, we add a new domain to Microsoft 365 and we want to have a domain alias for multiple or every user. Logging in Exchange Online Powershell To configure a alias for every user, we need to login into Exchange Online Powershell: POWERSHELL …
Microsoft Defender External Attack Surface Management (EASM)
Sunday, December 01, 2024 in Microsoft Defender XDR
Categories:
Microsoft Defender External Attack Surface Management (EASM) is a security solution for an organization’s external attack surfaces. It operates by monitoring security and operational integrity across the following assets: Websites IP addresses …
Azure Key Vault
Tuesday, November 26, 2024 in Microsoft Azure
Categories:
Azure Key Vault is a type of vault used to store sensitive technical information, such as: Certificates Secrets Keys What sets Azure Key Vault apart from a traditional password manager is that it allows software to integrate with the vault. Instead …
The Zero Trust-model
Monday, November 25, 2024 in Microsoft Entra
Categories:
The Zero Trust model is a security model to enhance your security posture by using 3 basic principles, and segmenting aspects of your IT environment into pillars. The 3 primary principles are: Verify Explicitly Least privileged access Assume Breach …
The MITRE ATTACK Framework
Monday, November 25, 2024 in Microsoft Defender XDR
Categories:
The MITRE ATTACK (ATT&CK) Framework is a framework which describes all stages and methods cyberattacks attacks are launched on companies in the last 15 years. The main purpose of the framework is to help Red and Blue security teams to harden …
AMC - Module 4: Resiliency and Redundancy in Azure
Thursday, November 21, 2024 in Azure Master Class
Categories:
This module is all about resiliency and redundancy in Microsoft Azure. Resiliency literally means flexibility. It refers to how resistant a solution is to certain issues and failures. We want to build our solutions redundant, because we don’t …
How to Export Active Directory (AD) users fast and easy
Thursday, November 14, 2024 in PowerShell
Categories:
Sometimes we need to export all of our AD users. The one time for applying changes, sometimes for monitoring the inventory but often for licensing purposes. At this page I will show you how to export all your AD users fast and easy. The Export AD …
AMC - Module 3: Governance in Microsoft Azure
Thursday, November 07, 2024 in Azure Master Class
Categories:
Introduction to Govenance in Azure Governance in Azure refers to the enforcement of rules and the establishment of standards in solutions, naming conventions, technology, etc. This is achieved through the management and importance of Management …
Configure DNSSEC and SMTP DANE Microsoft 365
Thursday, October 31, 2024 in Microsoft 365
Categories:
Recently, Microsoft announced the general availability of 2 new security protocol when using Microsoft 365 and the service Exchange Online in particular. SMTP DANE and DNSSEC. What are these protocols, what is the added value and how can they help …