Explore


Intune Custom Compliance Policy

Device compliance policies are a key feature when using Intune to protect your organization’s resources. In Intune, you can create rules and settings that devices…...

Read More

AWS EC2 and RDS daily snapshots status using BOTO3 Python Library

Applying filters to describe_snapshots or describe_db_snapshots functions and getting the desired results are really hard to implement. The best method for fetching snapshot status is…...

Read More

Migrating SYSVOL AD Replication from FRS to DFS in Windows Server 2016 and 2019

*Windows Server 2016 and 2019 Do Not Support FRS for SYSVOL Replication* The SYSVOL folder on any Active Directory domain controller stores Group Policies settings…...

Read More

11 Steps For Aligning Your BC/DR Program With Business Needs

11 STEPS FOR ALIGNING YOUR BC/DR PROGRAM WITH BUSINESS NEEDS Disaster recovery wouldn’t be complex if organizations could adopt a “one size fits all” approach…...

Read More

SIEM Use Cases

Usage of proper SIEM Use Cases is critical in setting up the security operations center (SOC) operations. A use case can consist of multiple technical…...

Read More