SQL Server authentication vs. Windows authentication: Which to use and when
Authentication is a critical component of security. Learn how SQL Server authentication works and how it differs from Windows authentication.
Authentication is a critical component of security. Learn how SQL Server authentication works and how it differs from Windows authentication.
Kerberos authentication has been Microsoft’s default authentication method since Windows Server 2000. Learn how it works and how to maximize its security.
NTLM authentication helps determine if a user accessing an IT system is who they claim to be. Learn how it works and why it can present risks.
Quest experts predict the trends for next year, and all agree that a key theme will be overcoming the IT talent shortage. Check out our top 9 predictions.
A FAQ on upgrading to Windows 11. What’s new for users? What’s new for IT pros? What’s missing? Learn how IT teams should plan and prepare.
Should you have PST files in Windows 365? And what should organizations entering the world of virtual computing do now? We break it all down.
Microsoft service accounts are a critical part of your Windows ecosystem. Learn what they are and 10 best practices for managing them efficiently.
Zerologon is a critical vulnerability Microsoft disclosed in Windows Netlogon Remote Protocol (MS-NRPC). Learn why it'll be a continued concern.
Learn how Active Directory disaster recovery gives admins better control by prioritizing the restoration of key domain controllers.
Learn about the recent connection between Remote Desktop Protocol (RDP) and ransomware attacks, as well as how you can limit your exposure.
Some AD Migrations must continue, This post outlines how you can move your migration forward even with a remote workforce.
COVID-19 phishing and malware attacks start on user workstations. Monitor these three logs to stop and spot these attacks: Windows security log, Sysmon log, and the PowerShell log.