In this article, I will be highlighting the benefits of having the “right” Microsoft Windows Deployment technologies setup within your environment, along with Microsoft Deployment Toolkit (MDT) to simplify your client operating system deployments. The article will list the important Microsoft technologies that need to be in place to make … Read More
Minimise the risk of ransomware with these 10 effective methods.
Ransomware is a type of virus/malware that restricts access to an infected computer (by encrypting the files) and requires the person pay a ransom to the malware operators to remove the restriction and gain access to those files again. The risk of ransomware attacks is an increasingly popular security concern … Read More
Adding functionality to the Active Directory Users and Computers Console
Frequently, I find myself and other IT support personnel need to quickly gain access to remote systems, run scripts against remote systems, or remote controlling computers for troubleshooting purposes. I typically head straight to the command line or run the related Active Directory administration tool directly; however, if the task … Read More
Client OS Deployment & Management
In my previous post: Active Directory Design and Network Resource Availability we discuss how your organization’s Active Directory design acts as a central orchestrator for your entire network and what roles you should be utilizing within your organization. In this post: Client OS Deployment & Management, I will be giving … Read More
Top 5 Network Security Best Practices
In this article, we look at the top 5 network security best practices that all businesses should be following. #1 – Install a Unified Threat Management (UTM) appliance to improve your network security at the edge. Install a Unified Threat Management (UTM) appliance that supports most or all of the … Read More
How to upgrade VMware tools and hardware for Cisco virtual servers
In this article we look at how to upgrade VMware Tools and Virtual Hardware for Cisco CM, PLM, and UC virtual servers. Upgrade your VMware vSphere environment if applicable (outside the scope of this guide) Once your VMware vSphere environment is upgraded, logon to your VMware vSphere Web Client and … Read More
How to Convert VMware VMDK Files Into Hyper-V VHD Files
I use a MacBook Pro in the field daily and find myself needing to spin-up some home-brewed Windows and Linux virtual machines quickly. To accomplish this, I prefer to build and maintain several VM’s utilizing VMware Fusion Pro on my Mac. Granted; VMware Fusion is “I believe” an inferior product … Read More
Network Resource Availability and Data Integrity
Part 2 of our Network Remodeling / Redesigning / Restructuring services series In my previous post Active Directory Design, Optimization, and Automation we discussed how your organization’s Active Directory design acts as the core system in which most other network functions stem from. In this post Network Resource Availability and … Read More
Active Directory Design, Optimization, and Automation
Part 1 of our Network Remodeling / Redesigning / Restructuring Services series Active Directory is the central repository for nearly all networks today. Some of the most important roles it is responsible for are: end-user authentication, security, and the ability to automagically control how servers, client computers, and end-users are provisioned … Read More
Network Remodeling / Redesigning / Restructuring Services – Overview
This multi-series blog post will be an overview of Source One Technology’s network remodeling/redesigning/restructuring services. This series will give you insight on the network management tools and protocols Source One Technology uses, how future maintenance costs are actually reduced, and how your network infrastructure can easily adapt over the course … Read More