Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Does LDAP work with Entra ID? Yes and No

To make a long story short: Microsoft offers the ability to sync Azure AD (Microsoft Entra ID) with an LDAP server, which can suffice as a short-term solution. This means your Azure AD would be duplicated to an on-prem LDAP ... Read More

Read More
Microsoft Intune Enterprise Wi-Fi Profile Best Practices

Microsoft Endpoint Manager (Intune) is a stellar MDM that we frequently encounter in managing managed devices, especially when the enterprise size is large, and we need to have centralized control over all the systems within the organization. Intune works really ... Read More

Read More
SCEP( Simple Certificate Enrollment Protocol): A Complete Guide

Table of Contents What is SCEP? Components of SCEP Gateway SCEP Gateway API URL SCEP Shared Secret SCEP Certificate Request SCEP Signing Certificate SCEP Device Enrollment Process How to Configure SCEP Building the SCEP Gateway Configuring SCEP in Your MDM ... Read More

Read More
AD CS Certificate Templates: Security Best Practices

Microsoft AD CS allows administrators to establish their domain’s CA to deploy a digital certificate with Microsoft PKI Infrastructure. To properly run their PKI infrastructure and after establishing their hierarchy, administrators will look to assign AD CS certificates to specific groups ... Read More

Read More
A Complete Guide To Wireless (Wi-Fi) Security

In the modern world, it seems as though it would be nearly impossible to function without access to the wireless internet. People everywhere rely on Wi-Fi for everything from entertainment to achieving their goals. But with the ubiquity of the ... Read More

Read More
How To Configure 802.1X for Ubiquiti UniFi:

In an era where network infrastructures must run smoothly, protecting sensitive data and securing connections is crucial. Ubiquiti UniFi is a market leader in networking solutions, providing a dependable and scalable platform recognized for its strength and durability. Ubiquiti Networks ... Read More

Read More
A High-Level Overview of Windows 802.1x Authentication

802.1X is a network security protocol that enhances the security of a network by requiring authentication before granting access, preventing unauthorized network access. In Windows environments, 802.1X is widely employed to ensure the security of both wired and wireless connections. ... Read More

Read More
Windows Access Control: ACL, DACL, SACL, & ACE

Read this to know more about access control list and its components and the best way to secure your enterprise network.

Read More
How to Resolve NPS Reason Code 22

Remote Authentication Dial-in User Service (RADIUS) is integral to network infrastructure, especially for authentication, authorization, and accounting (AAA) purposes. NPS (Network Policy Server) is Microsoft’s RADIUS server, replacing its age-old Internet Authentication Service (IAS). Like any other RADIUS, NPS performs ... Read More

Read More
Certificate Signing Requests: Explained

X.509 digital certificates use the X.509 Public Key Infrastructure (PKI) to certify a public key to a user, device, or service identity embedded in the certificate. A PKI encapsulates the framework to use a certificate signing request (CSR) and enables ... Read More

Read More
Why You Shouldn’t Use NPS with Azure AD(Microsoft Entra ID)

Since cloud-based solutions are becoming the norm today, knowing how different identity and access management tools work together and what they do is important. This article details Microsoft NPS (Network Policy Server) and Azure AD (Entra ID), two infrastructure elements ... Read More

Read More
[Solved] Wi-Fi Security Certificate Error

Functioning in the current world would be virtually impossible without access to wireless internet or Wi-Fi. Wi-Fi is used by people all over the world for everything from entertainment to showing up for work. However, with the internet’s pervasiveness comes ... Read More

Read More