Email retention is a legal requirement in many parts of the world. Keeping all of the emails that your company receives and sends plus all of their attachments requires a lot of space. You can reduce your on-site storage needs by archiving emails onto a remote server. There are many reasons that you need to keep all Read More
How to Fix PowerShell Script Won’t Execute as a Windows Scheduled Task
Issue like below: I have a PowerShell script (that works). In Windows Task Scheduler I created a new task to execute “C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe”, passing the argument as my PS1 script. When the task runs I get a Last Run Result of 0x1. I updated my script to write to a log file when the script opens and that Read More
Understand RADIUS Authentication with Azure Active Directory
Remote Authentication Dial-In User Service (RADIUS) is a network protocol that secures a network by enabling centralized authentication and authorization of dial-in users. Many applications still rely on the RADIUS protocol to authenticate users. Microsoft Windows Server has a role called the Network Policy Server (NPS), which can act as a RADIUS server and support Read More
How to Deploy Visio or Project with Intune
Sometimes I get the question how to the deploy Visio or project to a device that has already install Microsoft 365 apps without uninstalling all the existent binaries as a side effect, so I have created this short blogpost on how to deal with this task. It is possible to add e.g. Language Packs, Proofing Read More
Understand What Difference Between Policy-based vs. Route-mode VPN
From the beginning of mankind, the users have wanted to communicate securely and to protect sensitive information. With modern society where everything is digitized, this need for protection when it comes to computer network communication is fulfilled by Virtual Private Network (VPN). One of the most used protocols to build a VPN is Internet Protocol Read More
How to Troubleshoot IKE VPN Error on Palo Alto Firewall
SymptomThis document explains the various error logs seen during the IPSec tunnel negotiation issues. EnvironmentPA firewall version 8.1 and above ResolutionThe following debug is enabled to get the debug logs shown in the document. Primary-Tunnel is the IPSec tunnel name usually refers to the Phase 2.Primary-GW is the IKE Gateway that holds the Phase 1 settings. Read More