sample csv file

How to Define Naming Convention in Azure

An effective naming convention consists of resource names from important information about each resource. A good name helps you quickly identify the resource’s type, associated workload, environment, and the Azure region hosting it. For example, a public IP resource for a production SharePoint workload in the West US region might be pip-sharepoint-prod-westus-001. Diagram 1: Components of Read More

sample csv file

How to Fix PowerShell Script Won’t Execute as a Windows Scheduled Task

Issue like below: I have a PowerShell script (that works). In Windows Task Scheduler I created a new task to execute “C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe”, passing the argument as my PS1 script. When the task runs I get a Last Run Result of 0x1. I updated my script to write to a log file when the script opens and that Read More

sample csv file

Understand RADIUS Authentication with Azure Active Directory

Remote Authentication Dial-In User Service (RADIUS) is a network protocol that secures a network by enabling centralized authentication and authorization of dial-in users. Many applications still rely on the RADIUS protocol to authenticate users. Microsoft Windows Server has a role called the Network Policy Server (NPS), which can act as a RADIUS server and support Read More

sample csv file

How to Deploy Visio or Project with Intune

Sometimes I get the question how to the deploy Visio or project to a device that has already install Microsoft 365 apps without uninstalling all the existent binaries as a side effect, so I have created this short blogpost on how to deal with this task. It is possible to add e.g. Language Packs, Proofing Read More

sample csv file

Understand What Difference Between Policy-based vs. Route-mode VPN

From the beginning of mankind, the users have wanted to communicate securely and to protect sensitive information. With modern society where everything is digitized, this need for protection when it comes to computer network communication is fulfilled by Virtual Private Network (VPN). One of the most used protocols to build a VPN is Internet Protocol Read More