Active Directory Environment: Understanding the Tiering Model

In today’s interconnected digital landscape, safeguarding sensitive data and maintaining robust security measures is paramount for businesses of all sizes. For organizations utilizing Microsoft Active Directory, implementing a tiering model can provide a structured approach to securing critical assets and services. In this blog post, we’ll delve into Microsoft’s Active Directory tiering model and explore … Read more

Fortigate Best practices – Introduction

Management Network Should be independent from production or business traffic, it does not have to compete for resources and management access can be maintained when reconfiguring the production network. Policies By utilizing a management interface, the separation of management and production traffic is facilitated, enabling distinct policies tailored for specific purposes. This approach enhances the … Read more

Microsoft CA Server installation

Install the Windows feature. Open powershell as admin and execute the following command I strongly reccomend to not use the server name as the CA Common Name, since this will be an eyesore when the CA Service will be moved to another server with a different name at some point. Then the feature is installed … Read more

E-Mail awareness, why??

What is e-mail Email, or electronic mail, is a method of exchanging digital messages from an sender to one or more recipients. Email is one of the most widely used forms of online communication, and is used for personal, business, and other purposes. An email message consists of a subject line, a message body, and … Read more