Windows 10 update

The point of an update policy is to make the update process predictable, with procedures for notifying users so that they can plan their work accordingly and avoid unexpected downtime. The policy needs to address several distinct types of updates. The most familiar are the monthly cumulative security and reliability updates that are delivered on…

How to extend Security Updates of Windows 7

As we all know every operating system needs in support. But what will you do when the support will end? I should recommend you to look at such variant like extended Windows 7 support, cause the current support is going to end in January of 2020. But if you need keep going to run Window…

How to protect your business with Windows 10 security

It would be great if the process of securing a Windows 10 device can be reduced to a simple checklist. But the process of securing is much more complicated than that. The initial setup simply establishes a security baseline. When this configuration is complete, security needs continued vigilance and ongoing effort. A big part of…

How to maintain Exchange to comply with GDPR

There is a ton of information about paperwork needs to be done to comply with GDPR. Here we would answer the question: «What technically should be done at your mail server to meet requirements?»

How to Put Out Fires Before They Start or General Principles of IT Security

Having examined the effect of the WannaCry and Petya viruses and how the attacks affected our customers, we would like to share our findings and give general cybersecurity recommendations.

How to protect Virtual Machines hosted in Data Centers

In today’s age of Cloud Computing, each user has their own cloud storage for photos and an ever increasing number of companies rent cloud servers. This raises critical questions about the security of the stored information.

Remote Desktop Gateway client two-factor authentication via Azure Multi-Factor Authentication

Typical users have a lightminded attitude for password security. Our experience shows that even if a company uses strict policies, provides user training, etc., unencrypted devices still make their way outside the office.

Installing a white certificate on a Microsoft VDI farm

Many companies using VDI infrastructure for remote work from the uncontrolled personal workstations of the company’s employees. External users face the problem of distrusting the certificate issued by the corporate certifying authority when publishing a VDI farm to the Internet.

Deleting / restoring Metro apps in Windows 10

No matter how many supporters of the old version of the OS exist at present, it’s high time to turn to Windows 10. Accordingly, I invite you to take a closer look at the preloaded Metro apps. You will agree with me that very few people use absolutely every application forced upon us by Microsoft.

Collaborate on documents: SharePoint 2016. Part 2. Configure external access

This post continues the series of articles about SharePoint Server. In the first part, we looked at features for collaborating using Office Online and the desktop version of MS Office programs. This article will show you how to start and publish using SharePoint + Office Online.