Category Archive: Microsoft

Feb 13 2017

Building a three-tire Windows Certification Authority Hierarchy

Security is very important all over the internet but it’s also important in an organization, and it gets easier or harder to implement it depending on the size of the organization. Now I know, and you know, that there are many ways and many types of security implementations,

Continue reading »

Oct 28 2016

Configuring certificates in 2012/R2 Remote Desktop Services (RDS)

Nowadays, IT security it’s a serious deal, and Remote Desktop Services is no exception especially if there are external clients connecting to the infrastructure. In order to make it easier for those clients to connect, we as administrators have to configure these services as smooth and transparent as possible, and to secure them, we will …

Continue reading »

Oct 17 2016

Creating a 3-Leg Perimeter Network (DMZ) with TMG 2010

You’ve been thinking on moving some internal services more closely to the internet to provide a better experience for your users, and you’ve heard that by creating a Demilitarized Zone (DMZ) will help you accomplish that, with security in place. Creating forests and domains that will be exposed to the internet might be another reason …

Continue reading »

Sep 27 2016

Creating Active Directory Forest Trusts

Most companies nowadays have, or they prepare having multiple Active Directory forests in their environment, and as you know, forests are a completely different entity compared to an additional domain or tree. One forest does not trust another one, and can’t share information with another forest, unless a trust is created between the two. Usually …

Continue reading »

Sep 07 2016

How to reset forgotten Active Directory Domain Administrator password

It happens. Not so often, but it happens when you just can’t remember your domain/enterprise administrator password anymore. This is a big deal since you are the Active Directory God. Just imagine not being able to log in to your domain controllers for a day and you get my point. And since everything nowadays is …

Continue reading »

May 13 2016

Deploying VDI using Windows Server 2012/R2

In a previous article I talked about publishing desktops and applications to users by creating RDS Session Collections. In most cases that method works great, but as you know, there are users in the company that need dedicated resources to their virtual desktops, and by using RDS Session Collections we can’t separate those resources since …

Continue reading »

Feb 11 2016

Creating RDS Session Collections in Windows Server 2012/R2

After we deployed our Remote Desktop Services infrastructure and licenses it, we can start publishing desktop connections and applications to our internal users. I’ve said internal users, because to make the applications and desktops available for users outside the company, we need to deploy at least one RD Gateway server, which I’m going to discuss …

Continue reading »

Jan 15 2016

How to configure Windows Event Log Forwarding

Even if you have a small environment with a few servers here and there, after a while is becoming more and more difficult and time consuming to read the events on all of them. Purchasing a dedicated software solution just doesn’t cut it because of the budget constraints, but you still have to know what …

Continue reading »

Jan 08 2016

Deploy and configure a Windows Server 2012 R2 RD License Server

Most software out there need licensing, and Remote Desktop Services (RDS) is no exception. It is so important that Microsoft created a service just for this. If you are deploying Remote Session Hosts or a VDI infrastructure, and that’s the ability for users to RDP into a server and use it as their personal desktops or …

Continue reading »

Jan 04 2016

How to enable WinRM (HTTP) via Group Policy

Windows Remote Management or WinRM for short, exist in the Windows world for a long time and until now you probably never had anything to do with it. WinRM is a Microsoft implementation of WS-Management Protocol, that allows hardware and operating systems, from different vendors, to interoperate. If enabled, you can run scripts, install roles and …

Continue reading »

Older posts «

css.php