Blog LegaSystems Blog LegaSystems
  • Home
  • About Us
  • Managed Services
    • Remote Monitoring
    • Remote Backup
  • Design Bureau
    • Advertising Videos
    • Content Development
    • Local Internet Presence
    • On/Off Page SEO
    • Online Reputation Management
    • Social Network Development
  • Contact Us

Arşivler

  • July 2023
  • May 2023
  • April 2023

Kategoriler

  • General
  • Technology
Blog LegaSystems Blog LegaSystems
  • Home
  • About Us
  • Managed Services
    • Remote Monitoring
    • Remote Backup
  • Design Bureau
    • Advertising Videos
    • Content Development
    • Local Internet Presence
    • On/Off Page SEO
    • Online Reputation Management
    • Social Network Development
  • Contact Us
Blog LegaSystems Blog LegaSystems
The Latest
Enforcing AES 256 bit encryption for Domain Authentication
475 views
NetBIOS attack simulation and prevention
409 views
AD PSO – more complex AD passwords for privileged accounts
363 views
Requesting, signing and pairing internal certificates without Web Enrollment portal
376 views
  • Technology
04/26/2023

Requiring Lock Pin For Office 365 Mobile, Where To Configure?

Where to configure mobile device requirement for Office 365, in Exchange Admin Center or Intune? PIN and encryption…
byVal Komarovskiy, MBA
446 views
  • Technology
04/24/2023

TLS 1.2 Enforcement Breaks Password Reset And Password Write-Back In Azure AD

Microsoft is deprecating support for TLS 1.0 and TLS 1.1 and enforcing TLS 1.2 to enhance the security…
byVal Komarovskiy, MBA
402 views
  • Technology
04/09/2023

Security Configurations Feature Functionality For SharePoint Online, Microsoft Teams, and OneDrive for Business in M365

First things first, let us get the terms straight. The following is a list of Microsoft 365 integrated…
byVal Komarovskiy, MBA
340 views
  • Technology
04/09/2023

Microsoft 365 Security Configuration Impact On Feature Functionality In SharePoint Online, Microsoft Teams and OneDrive for Business

Configuring/Changing the security controls can impact the security capabilities of SharePoint Online, Microsoft Teams, and OneDrive for Business…
byVal Komarovskiy, MBA
344 views
  • Technology
04/09/2023

Bitlocker For The Enterprise – Microsoft BitLocker Administration And Monitoring

Data is an organization’s most valuable and irreplaceable asset, and encryption serves as the last and strongest line…
byVal Komarovskiy, MBA
352 views
  • Technology
04/09/2023

Windows 7 Extended Support Will End On January 14, 2020, Will You Be Ready?

What does end of extended support and end of life really mean? -No more #security or vulnerability patching…
byVal Komarovskiy, MBA
352 views
  • Technology
04/09/2023

ADANOMICS – Cardano ADA Supply, Reserves And Rewards

Where do Cardano ADA staking rewards come from? I often get asked “Where do ADA rewards come from?”…
byVal Komarovskiy, MBA
414 views
  • Technology
04/09/2023

Hybrid Identity Is The Core Of Modern Workforce

Active Directory – refresher! Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks.…
byVal Komarovskiy, MBA
402 views
  • Technology
04/09/2023

Security Configuration Change Management, Monitoring and Control

In this article I demonstrate an effective way to prepare, implement, monitor and test security configuration changes on…
byVal Komarovskiy, MBA
355 views
  • Technology
04/09/2023

Bitcoin Whitepaper Is Already On Every MacOS!

Bitcoin whitepaper is on every MAC! That’s right! BTC Whitepaper is on every macOS since Mojave in 2018.…
byVal Komarovskiy, MBA
379 views

Latests

  • Enforcing AES 256 bit encryption for Domain Authentication
  • NetBIOS attack simulation and prevention
  • AD PSO – more complex AD passwords for privileged accounts
  • Requesting, signing and pairing internal certificates without Web Enrollment portal
  • WispRider USB drive virus
Featured
  • 1
    WispRider USB drive virus
  • 2
    Enforcing AES 256 bit encryption for Domain Authentication
  • 3
    AD PSO – more complex AD passwords for privileged accounts
  • 4
    Assessments
  • 5
    TLS 1.2 Enforcement Breaks Password Reset And Password Write-Back In Azure AD
Recent
  • Security and Compliance
  • Requesting, signing and pairing internal certificates without Web Enrollment portal
  • “ProxyJacking” and SSH “HoneyPots” cyber exploit patterns
Blog LegaSystems Blog LegaSystems
www.legasystems.com sales@legasystems.com 855-534-2797
Designed & Developed by Lega Systems
Latest Posts
  • Technology

Enforcing AES 256 bit encryption for Domain Authentication

  • Technology

NetBIOS attack simulation and prevention