In a previous guide, I talked about how to install System Center Configuration Manager version 1606 (Current Branch) on Windows Server 2016. In this post, I will lay out all the necessary steps to installing the latest and greatest baseline version, System Center Configuration Manager version 1702 (Current Branch) on Windows Server 2016 using
We recently spoke about the benefits of bimodal IT. We even defined it with the help of our friends at Gartner. But why is it an important phrase to know? Over the past 18 months, Gartner has conducted research with clients worldwide to develop a fascinating analysis of user experiences as they implement bimodal IT.
I’d guess that the individuals behind cyber crimes often think of their actions as being a “victim-less” crime. “It’s only money”, they think, as they are targeting large organizations with deep pockets. Often, their victims are covered by insurance anyway. As it spreads across the world, WannaCry 2 (Wana Decrypt0r 2.0) has a mad, massive,
In our previous article, we discussed the problem of hash theft – that is, extracting from a machine the password hash associated with a local or domain account, and the relative ease of ‘brute force’ attacks on these hashes to recover plain-text passwords. There are ways of mitigating such attacks, and the focus of this
Open Sesame When you log on to your computer, Windows converts the password you type into a hash, which, is just a very long number. For example, the MD5 hash of ‘Sarahandjack99’ as a decimal number starts with: 6426944284693920619…. I’ve chopped off some digits in this example to keep things simple. The actual number has
So, let’s face it: every business goes through change. They need to evolve to generate new opportunities and react to new threats, and as part of that process, in a general sense, information technology always has to facilitate some part of this change or deal with the effects of this change, even if it was
Understanding the Public Key Infrastructure Modern encryption, and by extension much of the web of trust that is built around it, is based on the Public Key Infrastructure, or PKI. Understanding PKI without maths Most explanations start off by mentioning that dreaded word, – “mathematics”. Let’s see if we can get an idea of how
Last year, we highlighted (and addressed) a very specific challenge facing IT administrators preparing to migrate to Windows 10. While most organizations want to take advantage of the security features such as Secure Boot, Device Guard and Credential Guard in Windows 10, these features require UEFI firmware and the majority of Windows 7 devices today,
One of the perks of working for a technology company like 1E is having a lot of really smart co-workers. Like engineers of all persuasions everywhere, they do not like having a problem without an answer. They dig and dig until the truth is revealed! Occasionally, however, the answer evades them despite their best effort.
When you look at the role of a “company” in today’s world, the responsibility a business has towards its employees and customers now contains something that didn’t exist 50 years ago: an IT estate. With the advancement of technology comes the woes for when the technology fails. Because every company today is deemed a “digital”