When implementing broader security controls in Azure Active Directory, it is a best practice to create an “emergency access” or “break the glass” account that is not subjected to those controls. The purpose of this account is to use for remediating issues with those controls. If Azure MFA is broken, for instance, a privileged account … Continue reading Emergency Access Account Use Alerting in Azure Active Directory
The year was 2000 and I worked for a small web-based solution team and we wrote applications in Java. Many people that know me may not realize that I have a development background. I began teaching myself web development before we called it that back in the mid-90s. There were not many things going on … Continue reading AJAX Before AJAX Existed
Have you experienced an inconsistency with some mailboxes going into a quarantined state after being migrated to Exchange Server 2019 that seemed unexplainable? I had this very situation. A customer with a small-to-medium environment had a single mailbox that would routinely go into a quarantined state after it was migrated. At the time, about 100 … Continue reading Mailbox Quarantined After Migrating to Exchange Server 2019
Sentry Mode is a great feature available with Tesla vehicles that are equipped with cameras that can automatically record data based on detection of events. This has been beneficial for many owners that have had their cars vandalized. We are going to enable this on my Tesla Model 3 and use a little bit of … Continue reading Enabling Sentry Mode Recording for Tesla with PowerShell
You may have noticed that the Azure certifications have been revamped over the past year, or so. They are now role-based and come in four main tracks (although others exist): Azure Administrator Associate: AZ-103 Azure Developer Associate: AZ-203 Azure Solutions Architect Expert: AZ-300 and AZ-301 Azure DevOps Engineer Expert: AZ-400 There are tons of resources … Continue reading Azure Certifications – All Roads Start HERE
I have been using Pester and integrated it with my dxExchange.WebServices module following HDD/TDD practices. I have wanted to start incorporating Pester testing into cloud configuration validation and management for some time, but never really got around to it. A couple of weeks ago, I participated in a Network DevOps course facilitated by Nick Russo … Continue reading Pester for Infrastructure Validation
Ternary statements can be very useful but difficult to read. Many blue moons ago, I used to write a lot of Java, which has a ternary statement just like C: x = (condition) ? 1 : 0; It is a short and concise way to have a condition if it is a matter of setting … Continue reading PowerShell Ternary Statement
At Ignite 2018, Microsoft outlined several details related to Exchange Server 2019 that I previously wrote about. Included was the new Metacache Database (MCDB). The purpose is fairly clear: Exchange has been optimized to offer really large mailboxes on the cheapest storage possible which was afforded by being really intelligent about read/write operation and caching … Continue reading Should the Exchange 2019 Metacache Database Actually Be Implemented?