Virtual Machine Storage in Windows Server Hyper-V. File vs Block: SMB3 vs iSCSI vs NVMe-oF [PART1] 

Virtual Machine Storage in Windows Server Hyper-V. File vs Block: SMB3 vs iSCSI vs NVMe-oF [PART1]  https://ift.tt/3Yl1G2k Virtual machine storage is one of the key components of the virtualized infrastructure with block and file storage being the most used storage types. Choosing either will impact the performance of VMs, apps and services you run. That is […]

Securing Veeam Hardened Repository

Securing Veeam Hardened Repository https://ift.tt/mfpXoQc After selecting the right hardware for the Veeam Backup & Replication Hardened Repository and installing the Ubuntu Linux operating system, the next step is secure the operating system according to the DISA STIG (Defense Information Systems Agency Security Technical Implementation Guides) guidelines. This blog post describes the hardening process for […]

Top 10 Pillars of Zero Trust Networks

Top 10 Pillars of Zero Trust Networks https://ift.tt/1hKQplf Introduction to Zero Trust Networks Zero trust (ZT) is a "never-trust-always-verify" framework used by IT organizations to increase defenses against external attack to steal sensitive data, private information and resources. IT and enterprise architects use zero trust architecture (ZTA) based on zero trust principles to design and […]

Protect Office365 and Windows365 with Azure Firewall

Protect Office365 and Windows365 with Azure Firewall https://ift.tt/g94GthB Written by Yuval Perry (Azure Firewall Product Manager)   Office 365 customers are looking for the best cloud connectivity experience at scale to achieve end-to-end connectivity through the most optimized route possible. Traffic from the organization’s network to the required Office 365 endpoints should be managed and […]

Enable Microsoft 365 MFA Grace Period

Enable Microsoft 365 MFA Grace Period https://ift.tt/AzqLHYj This blog post will show how to enable a 14 days grace period for setting up Multi-Factor authentication for new Microsoft 365 users. By default, when MFA is enabled either manually, using security defaults or using conditional access, users have to set up MFA when they first log […]