Monthly Archives: February 2015

Video: Join the Virtualized!

Windows 10 brings a huge change when it comes to joining the trusted environment. How does the virtualization of the join change the security paradigm that we got so used to over the past decade. What happens to single sign-on and management of the workplace? Where are the new boundaries of the virtualized territory? How […]

0  

Video: Running highly-sensitive Domain Controllers on Hyper-V and Azure

Active Directory Domain Controllers hold the keys to your kingdom. So how do you virtualize these castles of identity, without compromising on the requirements of your organization? In this session, Raymond Comvalius (Windows Expert – IT Pro MVP) and Sander Berkouwer (Directory Services MVP) give best practices for hardening, backing up, restoring and managing virtualized […]

0  

Pictures of the 2015 Nordic Infrastructure Conference

Raymond and I delivered two sessions at the 4th edition of the Nordic Infrastructure Conference (NIC) in Oslo, Norway. This was my second time on stage for NIC and Raymond’s third time. Just like last year, we flew from Amsterdam Schiphol Airport (AMS) to Oslo Gardermoen Lufthavn (OSL) and upon arrival of our 2-hour flight, […]

Security Thoughts: Include command line in process creation events

Windows 8.1 and Windows Server 2012 R2 introduced an awesome new feature, called Include command line in process creation events, a Group Policy setting that expands the Audit Process Creation policy so events in Event Viewer (eventvwr.msc) include the actual commands issued. Last week, Microsoft introduced an update to Windows 7, Windows 8, Windows Server […]

0  

Vulnerabilities in Group Policy could allow security policy bypassing (MS15-011, MS15-014, CVE-2015-0008, CVE-2015-0009)

For its February 2015 Patch Tuesday on Tuesday February 10, Microsoft has released two security bulletin to address issues in Group Policy that would allow an attacker using a Man-in-the-middle (MitM) approach to bypass security policies, by forging packets sent by Domain Controllers.   The situation In many organizations, Group Policies are used to centrally […]

10  

WorkPlace Join vs. DirectAccess

Previously, I discussed the differences and commonalities for WorkPlace Join and Domain Join. Today, I would like to discuss the differences and commonalities between two very similar and yet widely different remote access technologies: WorkPlace Join and DirectAccess.   Let’s start with the characteristics these two technologies have in common: WorkPlace Join and DirectAccess are […]

0  

I will be speaking at Nordic Infrastructure Conference 4th Edition

The speaker season for 2015 is about to start. Of course, we're kicking off with the Nordic Infrastructure Conference (NICConf) in Oslo, Norway. I'll be copresenting two sessions with Raymond Comvalius at NIC's 4th edition. As our session on Experts Live 2014 on the pitfalls when virtualizing Domain Controllers was a huge success, we will […]

0