Table of Contents: 1. Microsoft Labels and Information Protection2. Sensitivity Labels Overview3. Using MCAS to apply Microsoft Sensitivity Labels4. Configuration5. Integration with Microsoft Copilot6. Licensing Requirements7. Management 8....
Protecting Your Data with Microsoft Sensitivity Labels
How To Calculate UNIX File Permissions
Introduction
Unix file permissions can seem a bit daunting to everyone. This guide will help to have a solid grasp on setting the correct permissions for all UNIX file systems. Covering both Linux and Mac distributions.
SSSD Linux Active Directory Authentication: Joining a Domain Without VPN
We have a few earlier blog posts on setting up Linux based Samba file shares with Active Directory authentication.Similarly, there are many documents on the Internet on configuring LDAP authentication to Active Directory.However, very little has...
Azure AD Authentication to Azure VM
Many organizations are adopting a cloud only approach to infrastructure. Why wouldn’t they? It’s scalable with predictable costs, and it can be accessed from virtually anywhere. However, authenticating with services and virtual machines on the cloud...
Fundamental Issues with IT Security
You don't have to look far to find yet another news story about a company or organization getting breached or hacked in some way. According to the Identity Theft Resource Center, by September 30, 2021 the number of data breaches had already exceeded...