What is Single Sign-On (SSO): Everything You Need to Know

When it comes to cloud services and security technology, IT and systems administrators should seriously consider having SSO implemented for greater convenience and security. What is single sign-on (SSO)? SSO is an authentication method that allows users to securely access multiple SaaS (Software-as-a-Service) applications, websites, and other digital resources with a single set of login…

The post What is Single Sign-On (SSO): Everything You Need to Know appeared first on Petri IT Knowledgebase.

Continue reading What is Single Sign-On (SSO): Everything You Need to Know

How to Use Role-Based Access Control with Windows Admin Center

In this article, I’ll explain what role-based access control (RBAC) is and how to configure it in Windows Admin Center. Next, I will cover topics such as creating roles, assigning permissions, and adding users and groups. I’ll include best practices and tips for managing access to your resources with Windows Admin Center. Windows Admin Center…

The post How to Use Role-Based Access Control with Windows Admin Center appeared first on Petri IT Knowledgebase.

Continue reading How to Use Role-Based Access Control with Windows Admin Center

What Is Windows Admin Center? A Quick Overview

Windows Admin Center (WAC) is the modern evolution of “in-box” management tools, like MMC (Microsoft Management Console) and Server Manager for Windows Server management. WAC provides wizards to guide users through its deployment and deploying Windows Servers and other cluster solutions. Learn more about what Windows Admin Center features and capabilities might be useful to…

The post What Is Windows Admin Center? A Quick Overview appeared first on Petri IT Knowledgebase.

Continue reading What Is Windows Admin Center? A Quick Overview

How to Build Guest Clusters on Hyper Converged Infrastructure (HCI)

With Hyper Converged Infrastructure (HCI) solutions becoming more common, many customers are now concerned with building clusters on top of those environments. In this article, I’ll explain how to build a guest HCI cluster and why traditional approaches don’t work. In the past, customers built redundancy and resilience based on virtualization and Storage Area Networks…

The post How to Build Guest Clusters on Hyper Converged Infrastructure (HCI) appeared first on Petri IT Knowledgebase.

Continue reading How to Build Guest Clusters on Hyper Converged Infrastructure (HCI)

Top 5 Features to Look for in On-Premises Veeam Storage

In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

The post Top 5 Features to Look for in On-Premises Veeam Storage appeared first on Petri IT Knowledgebase.

Continue reading Top 5 Features to Look for in On-Premises Veeam Storage

What Is an Access Control List (ACL)?

An access control list (ACL) is a fundamental component of computer security. ACLs help to control and manage access permissions to organizational resources. In this article, I will explain in detail what an access control list is and how you can use them to secure access to local and networked resources. ACLs are an integral part…

The post What Is an Access Control List (ACL)? appeared first on Petri IT Knowledgebase.

Continue reading What Is an Access Control List (ACL)?

Streamline Application Deployment with Microsoft Intune Enterprise App Management

Packaging and rolling out third-party applications to Windows endpoints has traditionally been a daunting task. It often involves a significant amount of testing and trial and error, and it can become a major time sink for IT Professionals. Recognizing this challenge, Microsoft announced a solution at its Ignite conference – a service set to make…

The post Streamline Application Deployment with Microsoft Intune Enterprise App Management appeared first on Petri IT Knowledgebase.

Continue reading Streamline Application Deployment with Microsoft Intune Enterprise App Management

What is Azure AD B2B?

Discover the benefits of using Azure AD B2B in your organization. Learn how it can improve collaboration and streamline access for external partners, and boost your users’ productivity, safely and securely. What is Azure B2B? Microsoft Entra B2B (formerly Azure AD B2B) is a feature/service within the Microsoft Entra ID that allows collaboration between your…

The post What is Azure AD B2B? appeared first on Petri IT Knowledgebase.

Continue reading What is Azure AD B2B?

What is Azure AD B2C?

Azure Active Directory (Azure AD) B2C is a cloud-based customer identity and access management service that provides business-to-customer (B2C) Identity-as-a-Service. It allows organizations to secure and manage their customer-facing applications – so external parties can seamlessly sign up and log in. Learn more about the features and benefits of Azure AD B2C below. What is…

The post What is Azure AD B2C? appeared first on Petri IT Knowledgebase.

Continue reading What is Azure AD B2C?

Top 10 Events to Audit in Active Directory to Uncover Security Risks

Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

The post Top 10 Events to Audit in Active Directory to Uncover Security Risks appeared first on Petri IT Knowledgebase.

Continue reading Top 10 Events to Audit in Active Directory to Uncover Security Risks