sample csv file

Understand DMARC DNS Record

DMARC, which stands for Domain-based Message Authentication, Reporting, and Conformance, is a DNS TXT record that can be published for a domain to control what happens if a message fails authentication (i.e., the recipient server can’t verify that the message’s sender is who they say they are). A published DMARC record basically serves two purposes: Read More

sample csv file

How to Setup DNS Conditional Forwarder for Subdomains on Windows 2019 Server

Around a week ago I redid my lab network and added 2 new domain controllers. I used one of my website domains as the lab domain to mimic how a corporation could be setup. So the domain for my network was “voltdrift” and the website domain is externally hosted with the domain of “www.voltdrift.com“ The Problem: Read More

sample csv file

How to Migrate VMware VMs to Azure

This article shows you how to migrate on-premises VMware VMs to Azure, using the Migration and modernization tool, with agentless migration. You can also migrate VMware VMs using agent-based migration. Compare the methods. This tutorial is the third in a series that demonstrates how to assess and migrate VMware VMs to Azure.  Note Tutorials show you the simplest deployment Read More

sample csv file

How to Connect Microsoft Defender XDR to Microsoft Sentinel

Microsoft Sentinel’s Microsoft Defender XDR connector with incident integration allows you to stream all Microsoft Defender XDR incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include all their alerts, entities, and other relevant information. They also include alerts from Microsoft Defender XDR’s component services Microsoft Defender for Endpoint, Microsoft Read More

sample csv file

How to Get the Microsoft Security Score from Command Line

To get the Microsoft security score from the command line, you can use PowerShell commands. Here’s a general approach: Here’s an example of how you might use PowerShell to get the security score: Remember, you may need to adjust the commands based on your specific environment and permissions. Also, ensure that you have the necessary Read More