<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 10.17.19 by Dan Franciscus

Searching Active Directory with PowerShell

For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory.

Posted on 10.16.19 by Tim Warner

Provide High Availability for Azure AD Connect

Once you start rolling with Azure AD Connect and hybrid identity between local Active Directory and Azure Active Directory, one of your first thoughts is, "What happens if my Azure AD Connect server goes offline?"

Posted on 10.16.19 by Jeff Edwards

PCI DSS Compliance 101: What You Need to Know

If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...

Posted on 10.15.19 by Greg Mooney

9 Ways for IT to Plan How to Respond to Natural Disasters

Plan, practice, and then keep on practicing! It sounds so simple, but those are the keys for IT teams who have to respond to a disaster delivered by Mother Nature—whether it’s a flood, fire, earthquake, or a major storm such as a hurricane or tornado.

Posted on 10.14.19 by Michael O'Dwyer

Do Customers Really Care About Data Breaches?

How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.

Posted on 10.10.19 by Greg Mooney

4 Myths of PCI Compliance

If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard.

Posted on 10.09.19 by Tim Warner

Deploy a Managed Storage Account in Microsoft Azure

Today I will teach you how to create what Microsoft calls a managed storage account. As you may know, each storage account has two interchangeable private keys you can use to authenticate programmatically to the general purpose storage account's four services:

Posted on 10.02.19 by Dan Franciscus

Using Invoke-Command in PowerShell

In this article, Dan Franciscus covers how to use the Invoke-Command and why it is one of his favorite commands to use in PowerShell.

Posted on 09.27.19 by Michael O'Dwyer

SSL 101: SSL/TLS Certificates And Why You Need Them

Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.

Posted on 09.26.19 by Joe Hewitson

Future Proofing Your Data Archiving Strategy

Data archiving is an odd practice at times. When big data is focused on every last bit of information, the idea of relegating any amount of it to outdated media can seem like a waste of resources. Add the cloud and you begin to see how out of place this concept can be.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.