SCCM SQL Query for Custom Patch Compliance Report
This report displays the list of Installed patches, Missing patches, not-required patches for a set of computers. It also displays other patch details. (more) »
This report displays the list of Installed patches, Missing patches, not-required patches for a set of computers. It also displays other patch details. (more) »
Bring your own device (BYOD) is the new normal. With organizations sticking to BYOD, securing enterprise data which employees can access is a top concern. Though many organizations are still reluctant to seriously consider BYOD policies, in the coming years the development of such policies will create as big a shift in enterprise computing as PCs did when they first entered the workplace. Though BYOD adds to increased productivity, reduced costs and ease of transition, securing the corporate data by maintaining employee's privacy is a major challenge. When organizations try to secure the devices, many a times they end up tightening it too much that users are skeptical about installing MDM agent on their personal devices; they are concerned that admins can glean personal information and could control how they use their devices. Users fear admins could block camera access, prevent copy and paste, or limit other functionalities. When users do not install MDM agent on (more) »
This post can help you while working with multiple Kubernetes clusters using different Google accounts. You will also learn about configuration in gcloud. (more) »
With the exponential growth in adopting cloud solutions, we all are trying to make Identity and access management as secure as possible. BUT, are you ignoring the security of On-Prem Environment in the urge of cloud Adoption? Azure Advanced Threat Analytics OR Azure Advanced Threat Protection, are the services which you must deploy to prevent security breach for your enterprise. It doesn’t really matter which cloud solution provider you are using for Identity management... as most of them offer scalable and robust solutions. However, losing security focus may damage the backbone of the entire Enterprise (On-Premise Environment). We all know from the best of our experiences and knowledge, attackers will always try to gain access to on-prem directory services, so that they can get a hold of all the resources and they can enter a stage called Domain Dominance. Based on behavioural analytics of typical attackers, all they need is to compromise one single Identity (more) »
This series will help you get up to speed with Git. You will learn about the Git ecosystem and how you can play it based on your level of expertise. (more) »
This series will help you get up to speed with Git. You will learn about the Git ecosystem and how you can play it based on your level of expertise. (more) »