How to Put Out Fires Before They Start or General Principles of IT Security

Having examined the effect of the WannaCry and Petya viruses and how the attacks affected our customers, we would like to share our findings and give general cybersecurity recommendations.

How to protect Virtual Machines hosted in Data Centers

In today’s age of Cloud Computing, each user has their own cloud storage for photos and an ever increasing number of companies rent cloud servers. This raises critical questions about the security of the stored information.

Remote Desktop Gateway client two-factor authentication via Azure Multi-Factor Authentication

Typical users have a lightminded attitude for password security. Our experience shows that even if a company uses strict policies, provides user training, etc., unencrypted devices still make their way outside the office.

Installing a white certificate on a Microsoft VDI farm

Many companies using VDI infrastructure for remote work from the uncontrolled personal workstations of the company’s employees. External users face the problem of distrusting the certificate issued by the corporate certifying authority when publishing a VDI farm to the Internet.

Deleting / restoring Metro apps in Windows 10

No matter how many supporters of the old version of the OS exist at present, it’s high time to turn to Windows 10. Accordingly, I invite you to take a closer look at the preloaded Metro apps. You will agree with me that very few people use absolutely every application forced upon us by Microsoft.

Collaborate on documents: SharePoint 2016. Part 2. Configure external access

This post continues the series of articles about SharePoint Server. In the first part, we looked at features for collaborating using Office Online and the desktop version of MS Office programs. This article will show you how to start and publish using SharePoint + Office Online.

Collaborate on documents with Microsoft: SharePoint 2016, Office Online and everything else. Part 1: What is it?

But Microsoft has been unfailingly persistent – they continue to improve their products all the time, on multiple levels as a result, now we can talk about the established infrastructure of document collaboration offered by Microsoft.

An IT specialist’s work time can now be monitored with SkypeTime

Like any other company, IT companies providing high tech services – whether software development, IT outsourcing, or remote infrastructure support – need tools to maintain adequate work discipline.

How to enable BITLOCKER on EXCHANGE servers

BitLocker is the built-in Microsoft Windows feature for full disk encryption that offers enhanced protection against data theft on stolen or lost computers or hard disks.

How to Configure Microsoft Azure Multi-Factor Authentication Server (MFAS) as a Second Authentication Factor

Why MS Azure? Best AD integration, which is very convenient when the same VPN account is used for multiple resources.