Posted by Romain Serre on January 17, 2019
Present an authentication form from Kemp LoadMaster

Some web services don’t include an authentication feature such as a form or SSO. When these web applications are accessible from the Internet through Kemp, it’s a huge security issue. To solve that, Kemp provides ESP (Edge Security Pack). Thanks to ESP, an authentication form is presented to clients before accessing the web applications.
Learn More

Posted by Florent Appointaire on January 15, 2019
[Azure] Call an Azure Function webhook from an automated Flow and a SharePoint list

How to create a list in SharePoint, to start automatically our Azure Function, through the webhook, from SharePoint.

Learn More

Posted by Romain Serre on January 10, 2019
Configure a reverse proxy on Kemp LoadMaster

A reverse proxy is a service that sits in front of one or more servers and accepts requests from clients for resources that are located on the server or servers. From a client point of view, a reverse proxy looks like a web server and can be easily used for remote access. The Kemp LoadMaster platform provides reverse proxy services that expand the range of workloads and provide access to dozens of web applications via a single IP address/port. Set up a reverse proxy server on the LoadMaster and get the perfect point in the network to control traffic and optimize performance!

Learn More

Posted by Mikhail Rodionov on January 8, 2019
Installing SharePoint 2019

Installing SharePoint 2019 – Be ready to move to the cloud! In October 2018, SharePoint Server 2019 became available to the public. Compared to SharePoint 2016, the new release attempts to prepare the user for the hybrid route and move to the cloud. Do you need to design and build your SharePoint based solutions and infrastructures with the cloud in mind, even if you still install on-premise version?

Learn More

Posted by Oleg Pankevych on January 3, 2019
Wasabi + Veeam + StarWind: Don’t put your “backup” eggs in one basket

The golden rule for the safety of your data is as follows: always back up and distribute copies to different locations. However, the choice of backup environments can be accompanied by high-cost issues, security concerns, the risk of service interruption/termination, and so on. Storing your data in the cloud seems to be the most optimal solution. But even here you may encounter certain troubles such as the need to pay for all services, subscriptions, service plans, and configuration of a public cloud storage provider. Do you want to know about a backup storage solution that eliminates the drawbacks of costly backup processes and meets regulatory data archival and retention requirements?

Learn More

Posted by Didier Van Hoye on December 27, 2018
Is Microsoft really considering an acquisition of Mellanox?

Carsten Rachfahl and I were working in the lab together last week. In the evenings during our end of year self-improvement hackathon. We had both seen the rumor that Microsoft was considering buying Mellanox. While we love Mellanox and Microsoft technologies I have mixed feelings about the rumor. It’s no secret that I use Mellanox cards and switches to deliver on our quest for excellence. Not because we make money from selling Mellanox but because they deliver great value for money. Their NICs and switches allow me to have 25Gbps at a cost and quality level traditional network companies won’t allow.

Learn More

Posted by Paolo Valsecchi on December 20, 2018
Office 365 update AD FS SSL certificate with Azure AD Connect

When the AD FS SSL certificate of your Office 365 infrastructure is about to expire, you need to update the AD FS SSL certificate accordingly to avoid services disruption. During the configuration of the Office 365 environment you need to install an SSL certificate to establish a secure communication between Office 365 components. To easily update the SSL certificate for both AD FS and WAP Servers you can use the Azure AD Connect tool. This procedure works also if the user sign-in method is not AD FS.

Learn More

Posted by Alex Samoylenko on December 18, 2018
VMware vSphere 6.7 Network I/O Control – getting under the hood

Generally, Network I/O Control (NIOC), a traffic-specific vSphere Distributed Switch (vDS) mechanism of network bandwidth regulation, is not common knowledge for VMware vSphere administrators. Probably, the reason is that NIOC is a vSphere Enterprise Plus feature. This means that many users, basically, do not have a chance to try it out as this license is quite expensive. Anyway, I believe it is good to know about NIOC. Being introduced in vSphere 4.1, back in 2010, this technology was something like a real breakthrough. NIOC appeared when 10G networking was becoming increasingly prevalent. It became clear that thanks to high network throughput you can go with fewer network adapters in ESXi hosts. On the other hand, having such a broad channel often faced users with another challenge: distributing the massive network bandwidth between various traffic types.

Learn More

Posted by Florent Appointaire on December 13, 2018
[Azure] Create a user with Azure Function

In the following 3 articles, we’ll see how to automate the user creation, with Azure Function, with a SharePoint Online interface and with a PowerApps application. To start in this first article, we will see how to create our new user, with an Azure Function.

Learn More

Posted by Gary Williams on December 11, 2018
SPF, DKIM and DMARC

Over the past few weeks, I have been dealing a lot with spoofed email and unfortunately, in a few cases, the consequences of someone falling for a spoofed email. I do not blame the people who fall for them as the ones I have seen have been incredibly convincing. Today’s Anti-spam solutions are good once they have been tuned a little (and for this I always advocate whitelisting known good domains), but they will often pass spoofed email because essentially, a spoofed email is a legitimate business email. In fact, the people crafting these things do not want them to be caught up in a spam filter as the email is designed to fool someone into thinking it is real, clearly another mechanism is required to handle such emails – Enter SPF, DKIM and DMARC.

Learn More