GPO

PKI for Microsoft GPO

Kainoa Lee Consumer Protection

PKI for Microsoft GPO

Microsoft’s Group Policy Object (GPO) is a useful tool to allow administrators to control the level of access for users on the network. In addition to providing strong security from outside threats, GPO also creates a secure environment for internal …

azure ad b2b vpn

Authenticating Guest Users for VPN with Azure AD B2B and SecureW2

Sam Metzler Consumer Protection

Authenticating Guest Users for VPN with Azure AD B2B and SecureW2

Cross-organization collaboration can be tricky for the IT department because they need to make sure the partner’s security policies match their own, then create temporary guest user accounts and ensure they are disabled once the collaboration is complete. If these …

azure ad b2b

Enable 802.1X For Guest Users with Azure AD B2B and SecureW2

Sam Metzler Consumer Protection, Education

Enable 802.1X For Guest Users with Azure AD B2B and SecureW2

Business-to-Business collaboration is essential for company growth. Thousands of companies have collaborated on projects to increase company value and spread risk. At the core of these collaborations is identity and access control management. When partnering up, companies need to ensure …

cyber security best practices msp

Best Cyber Security Practices for MSPs

Sam Metzler Consumer Protection, Security Threats

Best Cyber Security Practices for MSPs

Over 30 millions businesses have fewer than 1,000 employees and many don’t have the IT budget to provide effective network security. Managed Service Providers (MSP) are a godsend for small businesses because they assist or take over IT infrastructures for …

server certificate validation android

Android 11 Server Certificate Validation Error and Solution

Patrick Grubbs Consumer Protection, Tech Trends

Android 11 Server Certificate Validation Error and Solution

In December 2020, the planned Android 11 QPR1 security update will disable the ability to select “Do not validate” for the “CA Certificate” dropdown in network settings for a given SSID. Details can be found in the WPA3 Specification from …

User Lookup With Certificate-Based Authentication

Jake Ludin Consumer Protection, Education

User Lookup With Certificate-Based Authentication

Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the network from unauthorized entry. Only in very rare, …