Set up Microsoft Defender for Office 365
In this post I want to give you a summary about what Microsoft Defender for Office 365 is exactly and…
Default outbound access for VMs in Azure will be retired on 30 September 2025 – How to transition to an explicit method of public connectivity
Because default outbound access for VMs in Azure will be retired on 30 September 2025, I want to take a…
How Azure AD Privileged Identity Management works?
Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) which you can use to control and…
Enroll Windows Computer into Microsoft Intune
Microsoft Intune is a cloud-based endpoint management solution. It manages user access and simplifies app and device management across your…
How to reveal hidden WLANs (Hidden SSID)
By default all WLAN access points send out their SSIDs in beacon frames as shown below in the screenshot. These…
Domain Controller Protection via BitLocker Drive Encryption
If privileged access to a domain controller is obtained by a malicious user, it is also possible that the user…
Set up Ubuntu’s Built-In Firewall
Ubuntu’s built-in firewall is named ufw (uncomplicated firewall). Actually Ufw is just an utility which makes it easier to configure…
Set up SSH private/public Key Pair without using Password Authentication on Linux
SSH keys are not only more convenient but also improve the security in contrast to the password authentication, provided the…
Enable TLS for Postfix on Ubuntu
Regarding the Postfix documentation, TLS support is turned off by default, so you can start using Postfix as soon as…
Code Signing in Visual Studio
In this post I want to show how you can sign your Visual Studio application by using a X.509 code…