Active Directory User Creation Tool 1.2

Posted by Michael Schultz on Feb 16, 2018 8:24:38 AM

It is not every day I need to add users in bulk to Active Directory, but when I do, I usually need to write a script that can be quiet time-consuming. It just so happened that I came across a tool to make this process a little easier today. Its name is ADUC Tool, and it allows you to import users from a CSV file or build them based on pre-configured settings. The tool is based in PowerShell, but it has a GUI. While this is a no-frills option, it is free and is very customizable for any organization.

Read More

Topics: Tech Article

Big Changes Coming to Office Connectivity

Posted by Caleb Lund on Dec 19, 2017 11:45:00 AM

Check it out. 

Read More

Topics: Tech Article, Education

How to Stop Cortana from Talking During Windows 10 1703 Image Deployment

Posted by Caleb Lund on Oct 11, 2017 10:05:00 AM

With each new release of Windows, we continue to find more features and functions that Microsoft has rolled into the new build. Some of them are very welcomed and some are a little misunderstood or mildly annoying.

Read More

Topics: Tech Article

Dell EMC Isilon - The Cookie Monster for your Unstructured Data

Posted by Dan Sanderson on May 24, 2017 10:21:23 AM

Would you have guessed that unstructured data is growing at a rate much higher than structured data?  By 2020, IDC estimates that 80% of a typical businesses data will be unstructured.  

Read More

Topics: Tech Article

Ransomware and Cryptoware - "It's Not a Matter of IF but WHEN"

Posted by Igor Bogachev on Mar 20, 2017 8:51:27 AM

When cryptoware attacks your organization, it is often too late to do anything about it -
ransomware deploys incredibly fast. Once on a machine, it can take just minutes or even seconds to encrypt files and make them inaccessible. If the machine has a shared network drive, those files can be encrypted, too. What do security analysts suggest these days? Plan, Pray or Pay.

Read More

Topics: Tech Article, Education

Six years a "Leader" in Gartner's Magic Quadrant

Posted by Katie McDonald on Feb 7, 2017 10:05:00 AM

True Cybersecurity by Kaspersky Lab

2017 marks Kaspersky Lab’s sixth year as a “Leader” in Gartner’s Magic Quadrant.

Read More

Topics: Tech Article, Education

Top Tech Trends of 2017

Posted by Dan Sanderson on Jan 5, 2017 11:05:42 AM

Looking into 2017, I am heading into the year championing the latest technology trends.  Avoiding the hype is always a challenge in our industry, as there are a lot of great technology ideas out there, but few of them are actually executed on properly.  My crystal ball tells me that the below trends are going to be top of mind in 2017.

Read More

Topics: Tech Article

Customizing ADFS Claims Rules for Office 365

Posted by Terence Kolstad on Nov 4, 2016 10:16:06 AM

I was recently working with a customer on ADFS claims rules and thought to share the experience of how to make some simple customizations within ADFS to lockdown authentication to Office 365 services, in this case. The requirement was that if the authentication connection came from an External IP not listed (any of their many remote locations), then block the connection UNLESS you are part of a specific AD group.

Read More

Topics: Tech Article, Education

LAPS – A Simple, Must-Have Solution

Posted by Terence Kolstad on Sep 14, 2016 9:00:00 AM
Security is a big topic these days in both big businesses and small. With ransomware and cyber-attacks proliferating, IT's job of securing the internal infrastructure is becoming paramount. As with most areas, there are always simple solutions that can be implemented to help mitigate some of the risk posed to your network.
Read More

Topics: Tech Article

SAN Upgrade?  Hold that thought...Hyperconvergence is here.

Posted by Dan Sanderson on Aug 1, 2016 10:02:47 AM

The datacenter transition is AGAIN among us.  Years ago, it was moving from big iron (datacenter V1) to commodity X86 servers to standardize and give people the freedom of operating system choice.  Soon after, server virtualization took the world by storm.  To match the compute virtualization craze, storage virtualization and automated tiering simplified our storage lives.  In our industry, we really look at the migration from a physical to virtualized datacenter as datacenter V2.  

Read More

Topics: Tech Article

About this blog

Welcome to the Cyber Advisors Blog.  Please take a moment to read through our content.  If you would like more information on any of these topics, simply reach out to us via contact information below.  If you find our content valuable, please subscribe.  

 

 
 
Would you like to hear from us? Click Below!
Learn More

Subscribe Here!

Recent Posts

Posts by Tag

See all