<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on Alex Mags&#39; Blog</title>
    <link>https://blog.alexmags.com/posts/</link>
    <description>Recent content in Posts on Alex Mags&#39; Blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 17 Jan 2026 10:10:30 +0000</lastBuildDate>
    <atom:link href="https://blog.alexmags.com/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How to disable Microsoft 365 Copilot Chat</title>
      <link>https://blog.alexmags.com/posts/copilot-how-to-disable-copilot-chat/</link>
      <pubDate>Sat, 17 Jan 2026 10:10:30 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/copilot-how-to-disable-copilot-chat/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/copilotdisable.ai.png&#34; alt=&#34;disablecopilotai&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Microsoft includes Microsoft 365 Copilot Chat in their business and enterprise Office365 services.  If your organisation is not ready for this AI service, here&amp;rsquo;s how to disable it for now.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fix wobbly parcel shelf in Jaguar F-Type</title>
      <link>https://blog.alexmags.com/posts/jaguar-f-type-parcel-shelf-fix/</link>
      <pubDate>Wed, 15 Oct 2025 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/jaguar-f-type-parcel-shelf-fix/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/ftypeT2R35506.jpg&#34; alt=&#34;ftype parcel shelf grommet&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;If the parcel shell falls off in F-type Coupe here&amp;rsquo;s the fix.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FITCAMX Dashcam for Jaguar F-Type</title>
      <link>https://blog.alexmags.com/posts/jaguar-f-type-fitcamx-dashcam/</link>
      <pubDate>Sun, 12 Oct 2025 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/jaguar-f-type-fitcamx-dashcam/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/ftypedashcam.jpg&#34; alt=&#34;ftype dashcam&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Demos of the FITCAMX integrated dashcam for Jaguar F-Type.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Upgrade speakers in Jaguar F-Type</title>
      <link>https://blog.alexmags.com/posts/jaguar-f-type-speaker-upgrade/</link>
      <pubDate>Wed, 18 Jun 2025 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/jaguar-f-type-speaker-upgrade/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/ftypemeridian.jpg&#34; alt=&#34;ftype door speakers&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;How to upgrade the factory original speakers in a MY2016 Jaguar F-Type.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Calendar free/busy information sharing</title>
      <link>https://blog.alexmags.com/posts/exchange-online-/</link>
      <pubDate>Sat, 26 Apr 2025 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/exchange-online-/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/ChatGPTFreeBusy.png&#34; alt=&#34;sharing!&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Scheduling meetings is tricky when people are split across different companies and you can&amp;rsquo;t tell when the other side are available. If both companies are using Microsoft Exchange Online mail, you can choose to share calendar availability.  The Microsoft guidance didn&amp;rsquo;t work for me when one of the organisations was a more complicated Exchange Hybrid deployment.  Here&amp;rsquo;s how to fix error message: &amp;ldquo;The recipient&amp;rsquo;s server could not be determined. Contact your administrator&amp;rdquo;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Add Android Auto to Jaguar F-Type</title>
      <link>https://blog.alexmags.com/posts/jaguar-f-type-android-auto/</link>
      <pubDate>Sat, 19 Apr 2025 16:53:30 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/jaguar-f-type-android-auto/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/ftypeandroidauto.ai.png&#34; alt=&#34;ftypeandroidai&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;How to Install an aftermarket Apple CarPlay/Android Auto System in a Jaguar F-Type Without Losing Your Sanity (Mostly)&lt;/p&gt;&#xA;&lt;p&gt;So, you’ve got yourself a Jaguar F-Type—a sleek, growling beast that makes heads turn at every traffic light. Congratulations! But wait, what’s this? The infotainment system looks like it was plucked straight out of the early 2010s? And you’re weaving between lanes trying to reroute on your phone while driving. Fear not, for there’s a solution: installing an aftermarket Wireless Apple CarPlay and Android Auto Interface.&lt;br&gt;&#xA;Buckle up, because this is a story of ambition, frustration, and—if you’re lucky—triumph.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Active Directory Tiered Administration Model</title>
      <link>https://blog.alexmags.com/posts/ad-tiered-administration-model/</link>
      <pubDate>Sat, 30 Nov 2024 16:53:30 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/ad-tiered-administration-model/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/adtieres.png&#34; alt=&#34;tiered admin model&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;The Active Directory Tiered Admin Model is a way to organise AD users and groups with very clear boundaries between standard user accounts and their permission groups, server and application administrative accounts and groups, and domain wide access accounts and groups.  Creating and enforcing these boundaries hinders privilege escallation from desktop/user level access to domain compromise.  Here&amp;rsquo;s some automation to set it up.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Checking Microsoft 365 security configuration</title>
      <link>https://blog.alexmags.com/posts/saas-security-posture-management2024/</link>
      <pubDate>Sat, 07 Sep 2024 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/saas-security-posture-management2024/</guid>
      <description>&lt;p&gt;Was your M365 tenant configured securely when it was deployed?  Is it still configured securely now? Update on &lt;a href=&#34;https://blog.alexmags.com/posts/saas-security-posture-management/&#34;&gt;state of SaaS security posture management (SSPM) post from 2022&lt;/a&gt;. This time looking at community projects too.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mimecast authentication with Entra ID</title>
      <link>https://blog.alexmags.com/posts/mimecast-entra-sso/</link>
      <pubDate>Tue, 28 May 2024 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/mimecast-entra-sso/</guid>
      <description>&lt;p&gt;Sign-in to Mimecast can either be &amp;ldquo;service provider initiated&amp;rdquo; (where you sign-in via mimecast&amp;rsquo;s web portal), or &amp;ldquo;idenity provider initiated&amp;rdquo; (where you sign-in via Entra myapps.microsoft.com portal). But why not both!  This post shows how to enable both at once.&lt;/p&gt;</description>
    </item>
    <item>
      <title>LDAPS with self-signed certificate</title>
      <link>https://blog.alexmags.com/posts/ldaps-with-self-signed-cert/</link>
      <pubDate>Sat, 23 Mar 2024 09:55:38 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/ldaps-with-self-signed-cert/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/AzureBadgerEncryption.jpeg&#34; alt=&#34;Azure badger&#34;&gt;&#xA;&lt;em&gt;&amp;ldquo;Create a picture in the style of a pixar movie of a friendly badger, working in an office IT department, using encryption to secure Microsoft Active Directory&amp;rdquo; - bing chat&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;This post describes how to keep user passwords transmitted in LDAP authentication requests safe. &lt;a href=&#34;https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol&#34;&gt;Lightweight Directory Access Protocol (LDAP)&lt;/a&gt; is an open standard for directories. It underpins Microsoft Active Directory Domain Services (ADDS).  Applications need to check in with a central directory to authenticate user sign-ins. Other authentication protocols oAuth,SAML,Kerberos, even NTLM are prefered but still, even today, you&amp;rsquo;ll need to accomodate self-hosted business applicaitons that only support LDAP for authenticaiton. In my experience these are often JAVA developed apps or apps hosted on Linux.  This post has some PowerShell generate encryption certificates (private and public keys) to enable SSL encrypted LDAPS communication with domain controllers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cooking for engineers - Aioli garlic mayo</title>
      <link>https://blog.alexmags.com/posts/aioli/</link>
      <pubDate>Mon, 04 Mar 2024 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/aioli/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/aioligarlic.PNG&#34; alt=&#34;Aioli!&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Here&amp;rsquo;s the technical specification for a Aioli also known as garlic mayo.  Goes well with seafood or chicken. You make a garlic paste by drawing the back of a knife over chopped cloves. The raw garlic is punchy!.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cooking for engineers - Kladdkaka sticky chocolate cake recipe</title>
      <link>https://blog.alexmags.com/posts/kladdkaka/</link>
      <pubDate>Sun, 07 Jan 2024 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/kladdkaka/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/kladdkaka.png&#34; alt=&#34;kladdkaka cake!&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Here&amp;rsquo;s the technical specification for a chocolate cake that&amp;rsquo;s popular in scandinavia. There&amp;rsquo;s no raising agent such as baking powder so, while it gets crispy on the outside, it stays gooey and sticky in the middle. It&amp;rsquo;s very quick to make and so tasty!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cooking for engineers - Soda bread recipe</title>
      <link>https://blog.alexmags.com/posts/soda-bread/</link>
      <pubDate>Sun, 07 Jan 2024 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/soda-bread/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/sodabread.png&#34; alt=&#34;soda bread!&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Here&amp;rsquo;s the technical specification for a tasty loaf of bread. A restaurant near me serves and sells this bread. It&amp;rsquo;s very quick to make and so tasty!&lt;/p&gt;&#xA;&lt;h2 id=&#34;the-chemistry-stack-overview&#34;&gt;The Chemistry Stack Overview&lt;/h2&gt;&#xA;&lt;p&gt;Soda bread is fundamentally a chemical leavening system. Unlike yeast-based breads that rely on biological fermentation (slow deployment), soda bread uses an acid-base reaction for immediate lift. The kefir/buttermilk (pH ~4.5) reacts with sodium bicarbonate (NaHCO₃) to produce carbon dioxide gas, which expands in the dough matrix to create the crumb structure—think of it like deploying a containerized workload that instantly scales your dough volume.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Firewall policy as code with Hashicorp Terraform</title>
      <link>https://blog.alexmags.com/posts/firewall-rules-as-code-terraform/</link>
      <pubDate>Thu, 30 Nov 2023 19:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/firewall-rules-as-code-terraform/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/badgernetworkengineer.jfif&#34; alt=&#34;Azure badger&#34;&gt;&#xA;&lt;em&gt;&amp;ldquo;in the style of a pixar movie poster, draw a friendly badger configuring a firewall with code&amp;rdquo; - bing chat&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;Hashicorp Terraform is a tool for managing infrastructure as code.  You describe the desired state in versioned text files and the Terraform tool will drag your infrastructure into that state.  Sometimes it feels like creating the code takes longer than just using the admin GUI to get something done. Sometimes it&amp;rsquo;s MUCH faster&amp;hellip; This post describes adding 300 address ranges to a network security rule in just one line. How to create a terraform list from a text file.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Looking for you! Deploying Windows Hello For Business in a Hybrid AD Joined environment</title>
      <link>https://blog.alexmags.com/posts/looking-for-you-whfb/</link>
      <pubDate>Tue, 19 Sep 2023 19:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/looking-for-you-whfb/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/whfblookingforyou.png&#34; alt=&#34;Windows DVD&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Face recognition on Apple iPhones has long been a trusted and secure way to sign-in to business apps on corporate phones.  With the right camera hardware, it&amp;rsquo;s been available in Windows too for quite a while. This post describes deploying Windows Hello for Business (WHfB) in a Hybrid AD Joined environment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to download Windows 10 enterprise edition</title>
      <link>https://blog.alexmags.com/posts/download-windows10-enterprise/</link>
      <pubDate>Wed, 12 Jul 2023 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/download-windows10-enterprise/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/Windows_10_DVD_Label.png&#34; alt=&#34;Windows DVD&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;The &lt;a href=&#34;https://businessaccount.microsoft.com/Customer&#34;&gt;Microsoft Volume Licensing Portal&lt;/a&gt; doesn&amp;rsquo;t seem to be available if you&amp;rsquo;re licenced via &lt;a href=&#34;https://learn.microsoft.com/en-us/partner-center/csp-overview&#34;&gt;Cloud Solution Provider (CSP) program&lt;/a&gt;? I&amp;rsquo;m helping someone setup &lt;a href=&#34;https://learn.microsoft.com/en-us/mem/configmgr/mdt/&#34;&gt;Microsoft Deployment Toolkit&lt;/a&gt; and couldn&amp;rsquo;t get a Windows 10 Enterprise edition ISO. Fortunately there&amp;rsquo;s another way&amp;hellip;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Disable NetBIOS and LLMNR</title>
      <link>https://blog.alexmags.com/posts/disable-netbios/</link>
      <pubDate>Sat, 28 Jan 2023 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/disable-netbios/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/NetBIOSmeme.png&#34; alt=&#34;NetBIOS Meme&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Hey defenders! Hackers and pentesters hate it when you disable the old NetBIOS network service. They love to respond to NetBIOS requests from PCs on your company LAN so they can impersonate your servers and steal some credentials. Here&amp;rsquo;s how to disable the old NetBIOS service so as not to give hackers and pentesters an easy ride.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SCCM CMTrace and OneTrace</title>
      <link>https://blog.alexmags.com/posts/cmtrace-onetrace/</link>
      <pubDate>Fri, 30 Dec 2022 09:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/cmtrace-onetrace/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://learn.microsoft.com/en-us/mem/configmgr/core/support/media/3555962-onetrace.png&#34; alt=&#34;Tailing log files&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;You found this page because you&amp;rsquo;re looking for SCCM CMTrace to work with log files? Hope this post helps you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Checking SaaS security configuration (SSPM)</title>
      <link>https://blog.alexmags.com/posts/saas-security-posture-management/</link>
      <pubDate>Sun, 02 Oct 2022 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/saas-security-posture-management/</guid>
      <description>&lt;p&gt;Was your SaaS software configured securely when it was deployed?  Is it still configured securely now?&lt;br&gt;&#xA;This article discusses the risk to your data of misconfigured/unhardened SaaS software and the emerging products to automate security checking of SaaS.&lt;/p&gt;</description>
    </item>
    <item>
      <title>M365 Feature deployment order</title>
      <link>https://blog.alexmags.com/posts/m365-feature-deployment-order/</link>
      <pubDate>Tue, 16 Aug 2022 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/m365-feature-deployment-order/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://m365maps.com/files/Microsoft-365-Enterprise-Landscape.htm&#34;&gt;&lt;img src=&#34;https://m365maps.com/files/Microsoft-365-Enterprise-Landscape.png&#34; alt=&#34;M365 landscape by By Aaron Dinnage&#34;&gt; &amp;ldquo;M365 landscape by By Aaron Dinnage&amp;rdquo;)&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;From the excellent &lt;a href=&#34;https://m365maps.com/files/Microsoft-365-Enterprise-Landscape.htm&#34;&gt;feature licensing chart by Aaron Dinnage&lt;/a&gt;, you can see the Microsoft 365 suite has so many productivity and security components. It&amp;rsquo;s difficult to know where to start.  I&amp;rsquo;d like to suggest a roadmap for implementing M365 features and getting value out of M365 licensing. The roadmap would be based on dependencies (you need X before you can deploy Y) and it should be prioritised on business value. I also wanted to experiment with the &lt;a href=&#34;https://mermaid-js.github.io/&#34;&gt;MermaidJS&lt;/a&gt; library for creating dependency diagrams.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exchange Online Migration gotchas</title>
      <link>https://blog.alexmags.com/posts/exchange-migration-gotchas/</link>
      <pubDate>Sun, 14 Aug 2022 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/exchange-migration-gotchas/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/ExoMigration.drawio.png&#34; alt=&#34;e-mail to the cloud!&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Exchange Online migration is a complicated project in a large organisation. So complicated that some organisations haven&amp;rsquo;t completed this yet. There&amp;rsquo;s many technical integrations and operational processes with this service. Here&amp;rsquo;s a post about technical and operational problems that can occur when migrating email to Exchange Online. What has tripped you up in an Exchange migration? Let me know what I&amp;rsquo;ve missed!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Career break</title>
      <link>https://blog.alexmags.com/posts/career-break-2022/</link>
      <pubDate>Thu, 28 Jul 2022 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/career-break-2022/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/2022travel.png&#34; alt=&#34;Travel&#34;&gt;&#xA;I fancied a break and change of workplace. So my wife and I both resigned from our jobs and we&amp;rsquo;re taking the summer off. 😎&lt;/p&gt;</description>
    </item>
    <item>
      <title>Internet Explorer End of Life. Find IE usage in your Defender for Endpoint data</title>
      <link>https://blog.alexmags.com/posts/internet-explorer-eol-kql/</link>
      <pubDate>Mon, 06 Jun 2022 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/internet-explorer-eol-kql/</guid>
      <description>&lt;p&gt;This post has some KQL to report usage of Internet Explorer.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shields up! Find CISA Known Exploited Vulns in your Defender for Endpoint data</title>
      <link>https://blog.alexmags.com/posts/shields-up-cisa-nev-kql/</link>
      <pubDate>Fri, 04 Mar 2022 18:00:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/shields-up-cisa-nev-kql/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://www.cisa.gov/sites/default/files/inline-images/web-banner_1200x212_webpage-header_940x212.png&#34; alt=&#34;Shields up!&#34;&gt;&#xA;This post has some KQL to report CISA Known Exploited Vulns within your environment.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exchange Onlne Email Investigation</title>
      <link>https://blog.alexmags.com/posts/exchange-online-email-investigation/</link>
      <pubDate>Sat, 26 Feb 2022 08:59:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/exchange-online-email-investigation/</guid>
      <description>&lt;p&gt;This post has some KQL to report &amp;ldquo;who read the sensitive email and who opened the sensitive attachment&amp;rdquo; using Defender for Office365 and Defender for Endpoint.&lt;/p&gt;</description>
    </item>
    <item>
      <title>KQL for files uploaded to cloud</title>
      <link>https://blog.alexmags.com/posts/kql-for-file-uploaded-to-cloud/</link>
      <pubDate>Sat, 19 Feb 2022 09:00:38 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/kql-for-file-uploaded-to-cloud/</guid>
      <description>&lt;p&gt;This post has some KQL to report on files uploaded to cloud via Microsoft or Google browsers.  It requires Office365 sensitivity labels, Defender for EndPoint and (for Google Chrome) the &lt;a href=&#34;https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-chrome-get-started&#34;&gt;Microsoft Compliance extention&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Domestic Wifi for farmhouse</title>
      <link>https://blog.alexmags.com/posts/domestic-wifi-farmhouse/</link>
      <pubDate>Sat, 31 Jul 2021 09:00:38 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/domestic-wifi-farmhouse/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;https://blog.alexmags.com/images/FarmHouseC1740.jpg&#34; alt=&#34;Farmhouse built circa 1740&#34;&gt;&#xA;This post is about extending Wifi in my brother-in-law&amp;rsquo;s ancient farmhouse.&lt;/p&gt;</description>
    </item>
    <item>
      <title>PrintNightmare Discover Print Servers</title>
      <link>https://blog.alexmags.com/posts/printnightmare-discovery-print-servers/</link>
      <pubDate>Tue, 06 Jul 2021 18:55:38 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/printnightmare-discovery-print-servers/</guid>
      <description>&lt;p&gt;Find all servers, with printer published to users in AD, by looking for printerqueue objects.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Local admin report with Defender for EndPoint</title>
      <link>https://blog.alexmags.com/posts/local-admin-report-dfe/</link>
      <pubDate>Sat, 12 Jun 2021 07:51:28 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/local-admin-report-dfe/</guid>
      <description>&lt;p&gt;Securing Windows PCs starts with managing local administator access. Microsoft Defender for Endpoint logs every login and records if it was a local admin.  Use this KQL query in the Advanced Hunting portal to create a report.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bitlocker status report with Defender for EndPoint</title>
      <link>https://blog.alexmags.com/posts/bitlocker-status-report-dfe/</link>
      <pubDate>Sat, 12 Jun 2021 06:51:28 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/bitlocker-status-report-dfe/</guid>
      <description>&lt;p&gt;Are all your machines encrypted? If a laptop was lost is the data protected or you&amp;rsquo;ll need to declare.&#xA;Microsoft Defender for EndPoint (aka ATP) stores Bitlocker status information. Use the following KQL query in the Advanced Hunting portal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ultimate accessory for standing desk</title>
      <link>https://blog.alexmags.com/posts/standing-desk-ultimate-accessory/</link>
      <pubDate>Mon, 31 May 2021 08:30:14 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/standing-desk-ultimate-accessory/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://amzn.to/2SVb1rK&#34;&gt;&lt;img src=&#34;https://blog.alexmags.com/images/crocs.png&#34; alt=&#34;Standing desk + croks&#34;&gt;&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Like many I&amp;rsquo;ve been working from home for a while.  I use a standing desk and a recent and best accessory purchase is, believe it or not, footware.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Assign Azure AD role By AD Security Group</title>
      <link>https://blog.alexmags.com/posts/assign-aad-role-by-ad-security-group/</link>
      <pubDate>Sat, 13 Mar 2021 14:15:13 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/assign-aad-role-by-ad-security-group/</guid>
      <description>Using AD security groups to delegate access to Azure AD roles is not supported at the moment (March 2021). This post offers two workarounds.&#xA;Permissions to manage Azure AD and Office365 are often assigned via Azure AD Roles. If you have strong access management processes and tooling for on prem Active Directory (access request &amp;amp;approval workflow, joiners &amp;amp; leavers, access reviews &amp;amp; reporting, auditing and alerts) you&amp;rsquo;ll likely want to reuse these to manage access to Azure AD and Office365.</description>
    </item>
    <item>
      <title>Auto Configure Git client proxy authentication</title>
      <link>https://blog.alexmags.com/posts/git-client-with-corp-proxy/</link>
      <pubDate>Sat, 27 Feb 2021 16:55:38 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/git-client-with-corp-proxy/</guid>
      <description>This post has some PowerShell to make Git client work on Windows in corporate environment.&#xA;Short version Use the Microsoft Credential Manager for Git. Don&amp;rsquo;t expose passwords in plaintext in Git config or environment variable. The Microsoft Credential Manager will store creds for proxy amd git repo in Windows Credential Manager Git client doesn&amp;rsquo;t accept domain name in Git config, when you enter creds in Credential Manager change ID to &amp;lt;userID&amp;gt; format Automatically configurge Git client to authenticate with corporate proxy Git client doesn&amp;rsquo;t support Web Proxy Auto Discovery (WPAD).</description>
    </item>
    <item>
      <title>Compliance Boundaries</title>
      <link>https://blog.alexmags.com/posts/compliance-boundaries/</link>
      <pubDate>Sun, 21 Feb 2021 20:22:58 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/compliance-boundaries/</guid>
      <description>Very niche post today. Few will need to delve into Office 365 Compliance Boundaries unless they need to unblock some regulatory compliance requirement. If your in that situation hopefully this will help you.&#xA;The scenario is this: you have multiple eDiscovery teams in your organisation. Each eDiscovery team should only see content belonging to users in their own sphere of responsibility.&#xA;Example requirement:&#xA;eDiscovery team ACME should only be able to see content for company ACME</description>
    </item>
    <item>
      <title>WinOps 2019 Complaince as Code with Office365</title>
      <link>https://blog.alexmags.com/posts/o365-compliance-as-code/</link>
      <pubDate>Tue, 24 Sep 2019 22:06:34 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/o365-compliance-as-code/</guid>
      <description>I wanted to share this idea of using versioned code and unit tests to manage Office365 tenant configuration between environments. So I did a talk about it at the annual WinOps conference in London.&#xA;Slides so-i-devsecopsed-office-365</description>
    </item>
    <item>
      <title>Public Cloud Risk Management</title>
      <link>https://blog.alexmags.com/posts/talk-riskmanagement/</link>
      <pubDate>Thu, 21 Mar 2019 22:06:34 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/talk-riskmanagement/</guid>
      <description>A big part of my work lately has been describing, tracking and managing the risk involed with moving data from the traditional datacentre with it&amp;rsquo;s firewalled perimiter to public cloud. The NIST Cyber Security Framework was useful as a way of grouping and classifying risks.&#xA;https://www.slideshare.net/AlexMagnay/risk-management-for-public-cloud-projects</description>
    </item>
    <item>
      <title>AWS Architecture Talk</title>
      <link>https://blog.alexmags.com/posts/talk-aws-architecture/</link>
      <pubDate>Sun, 20 Aug 2017 22:06:34 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/talk-aws-architecture/</guid>
      <description>Amazon invited me to record a segment in the AWS Architecture series. This was a fun afternoon in their studio. </description>
    </item>
    <item>
      <title>Meraki switch JSON</title>
      <link>https://blog.alexmags.com/posts/meraki-switch-json/</link>
      <pubDate>Sat, 29 Jul 2017 14:52:28 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/meraki-switch-json/</guid>
      <description>Hi&#xA;Meraki devices have status pages. These can be accessed by internal clients. See https://documentation.meraki.com/zGeneral_Administration/Tools_and_Troubleshooting/Using_the_Cisco_Meraki_Device_Local_Status_Page&#xA;Wireless Access points MR - http://ap.meraki.com Switches MS - http://switch.meraki.com Routers MX and Z1 - http://wired.meraki.com Any - http://setup.meraki.com This URL will work for any Cisco Meraki device, but will only access the first device in its path. For example, if you’re on a PC connected to a Meraki switch you can connect to http://switch.meraki.com/ which gives you a status page about your connection.</description>
    </item>
    <item>
      <title>Grid Computing on public cloud</title>
      <link>https://blog.alexmags.com/posts/grid-computing-on-public-cloud/</link>
      <pubDate>Wed, 02 Nov 2016 15:05:06 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/grid-computing-on-public-cloud/</guid>
      <description>I gave a talk on using public cloud to host grid computing/HPC workloads. The elastic and on demand nature of public cloud is a great fit for spikey workloads like grid computing. I&amp;rsquo;d had some fun building an autoscaling MATLAB HPC cluster (scale out and scale back) and talked about it at a breakfast briefing with our consultancy Hentsu.&#xA;https://www.slideshare.net/hentsu/infinitely-scalable-clusters-grid-computing-on-public-cloud</description>
    </item>
    <item>
      <title>Public Cloud Security talk</title>
      <link>https://blog.alexmags.com/posts/public-cloud-security/</link>
      <pubDate>Fri, 26 Aug 2016 14:54:21 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/public-cloud-security/</guid>
      <description>I gave a talk on cloud security.&#xA;Before companies will start using Public Cloud they need to know it&amp;rsquo;s safe to use. There&amp;rsquo;s plenty of stories in press about security breaches, but AWS for example makes it clear in their &amp;ldquo;Shared Responsibility Model&amp;rdquo; that you still have to use security best practices such as least rights privilege, network segmentation (eg a DMZ) to contain any breach.&#xA;https://www.slideshare.net/hentsu/cloud-security-for-regulated-firms-securing-my-cloud-and-proving-it-65384157?qid=6a90d703-73bf-4892-b99d-cb1da1b9fcbd&amp;amp;v=&amp;amp;b=&amp;amp;from_search=2</description>
    </item>
    <item>
      <title>DevTest Labs</title>
      <link>https://blog.alexmags.com/posts/devtest-labs/</link>
      <pubDate>Sun, 29 May 2016 13:37:18 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/devtest-labs/</guid>
      <description>Great talk on enabling developers to make use of DevTest labs on Azure&#xA;https://channel9.msdn.com/events/Visual-Studio/Alm-Days-2016/Needs-when-running-your-DevTest-Infrastructure-on-Azure&#xA;https://blogs.msdn.microsoft.com/devtestlab&#xA;http://ClemensReijnen.nl&#xA;http://www.uk.sogeti.com/services/microsoft-services/oneshare-cloud-based-development-and-testing/</description>
    </item>
    <item>
      <title>Snowboarding in Meribel</title>
      <link>https://blog.alexmags.com/posts/snowboarding-in-meribel/</link>
      <pubDate>Sun, 24 Jan 2016 21:41:41 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/snowboarding-in-meribel/</guid>
      <description>I took some technology to the alps, a GoPro Hero 4 silver. Great bit of kit, was easy to view vids on iPad over WiFI at the end of the day. If attaching to a helmet use a tether to your goggle clip or loose it when you crash on your head. Back home the video editor, GoPro Studio, crashed a lot :-(&#xA;(https://vimeo.com/152906550)&#xA;HD file: (http://tinyurl.com/hx9d97u) or (http://1drv.ms/1PezEom)</description>
    </item>
    <item>
      <title>High Performance Computing on AWS</title>
      <link>https://blog.alexmags.com/posts/high-performance-computing-on-aws/</link>
      <pubDate>Wed, 20 Jan 2016 21:03:27 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/high-performance-computing-on-aws/</guid>
      <description>I ran a project to deploy an HPC cluster using on-demand AWS Elastic Compute Cloud (EC2) resources. The HPC cluster provides researchers with compute resource to quickly run mathematical simulations across very large datasets. This deployment was a replacement for aging on premises HPC hardware and an opportunity to trial Amazon AWS in a hybrid cloud configuration. High security implementation:&#xA;One way firewall rules between company network and AWS (company connects out to AWS resources, AWS resources can&amp;rsquo;t connect in) Encryption of data in transit and at rest AWS Direct Connect connecting company to AWS.</description>
    </item>
    <item>
      <title>Nordic Infrastructure Conference</title>
      <link>https://blog.alexmags.com/posts/nordic-infrastructure-conference/</link>
      <pubDate>Sun, 03 Jan 2016 08:39:13 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/nordic-infrastructure-conference/</guid>
      <description>While hunting for some Hyper-V videos, I came across recorded sessions from the 4th Nordic Infrastructure Conference. No sales pitches, only some great talks from field hardened consultants. The sessions are focused on Enterprise Infrastructure (Microsoft Windows Server, System Centre, Azure, PowerShell DSC, Identity Management, Security/hacking).&#xA;Session Info http://2015.nicconf.com/sessions Recorded sessions: https://www.youtube.com/channel/UChu8zqu8d1mjWxNRLlGXUAw </description>
    </item>
    <item>
      <title>PowerShell wait music</title>
      <link>https://blog.alexmags.com/posts/powershell-wait-music/</link>
      <pubDate>Thu, 31 Dec 2015 16:55:46 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/powershell-wait-music/</guid>
      <description>My long running PowerShell scripts now have background musak thanks to:&#xA;http://www.adminarsenal.com/admin-arsenal-blog/powershell-music-remotely https://www.youtube.com/watch?v=FsoIfkNQYEg http://youtube-mp3.org/ $scriptDir = Split-Path -Path $MyInvocation.MyCommand.Definition -Parent $musakFilePath=&amp;#34;$scriptDir\musak.mp3&amp;#34; $wmplayer = New-Object System.Windows.Media.MediaPlayer $wmplayer.Open($musakFilePath) Start-Sleep 2 # This allows the $wmplayer time to load the audio file $duration = $wmplayer.NaturalDuration.TimeSpan.TotalSeconds $wmplayer.Play() $stopwatch=[system.diagnostics.stopwatch]::StartNew() while ($stopwatch.Elapsed.Seconds -lt $duration) { Write-Progress -Activity &amp;#34;Doing stuff, please hold…&amp;#34; -status &amp;#34;$($stopwatch.Elapsed.Seconds) seconds&amp;#34; -percentComplete ($stopwatch.Elapsed.Seconds / $duration*100) # do something # break when done start-Sleep -s 1 } $wmplayer.</description>
    </item>
    <item>
      <title>SCCM Client duplicate GUIDs and VMware View Blast</title>
      <link>https://blog.alexmags.com/posts/sccm-client-duplicate-guids-and-vmware-view-blast/</link>
      <pubDate>Tue, 29 Dec 2015 15:58:03 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/sccm-client-duplicate-guids-and-vmware-view-blast/</guid>
      <description>Another super niche blog post. No one is ever going to find this&amp;hellip;. So I had to dig into System Centre Configuration Manager today, probably Microsoft&amp;rsquo;s most complex product. I&amp;rsquo;ve been using this massively scalable and capable scheduling system since SMS1.2. But it still a bit scary to support&amp;hellip; Machines cloned by VDI service VMware View were coming up with the same unique ID. The SMS client had been captured in the reference image that was cloned to create desktop pools.</description>
    </item>
    <item>
      <title>AD authentication to AWS from PowerShell</title>
      <link>https://blog.alexmags.com/posts/ad-authentication-to-aws-from-powershell/</link>
      <pubDate>Fri, 11 Dec 2015 01:29:39 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/ad-authentication-to-aws-from-powershell/</guid>
      <description>I&amp;rsquo;ve done a couple of other posts on using AD credentials with AWS API. You setup AWS IAM to trust AD Federation Services (ADFS) for authentication. You get temporary access keys to use with the AWS API. This is safer than making lots of IAM accounts with long term passwords (Secret Access Keys) that end up embedded in code and stored who knows where. See previous posts for an overview of AD authentication to AWS.</description>
    </item>
    <item>
      <title>MSDN subscriptions for your developers get you cheaper Azure VMs</title>
      <link>https://blog.alexmags.com/posts/msdn-subscriptions-for-your-developers-get-you-cheaper-azure-vms/</link>
      <pubDate>Mon, 07 Dec 2015 22:16:09 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/msdn-subscriptions-for-your-developers-get-you-cheaper-azure-vms/</guid>
      <description>We know Visual Studio Pro with MSDN gets you unlimited Windows Server (including Hyper-V for virtualisation) and unlimited SQL. This is a way of licensing Microsoft software in your on premises test and development environments.&#xA;You can now bring your own MSDN licences with you to Azure. This way the Microsoft software in your Windows and SQL VMs on Azure is already paid for and you pay the equivalent of Linux rates for Windows and SQL VMs on Azure.</description>
    </item>
    <item>
      <title>AWS hardware VPN over direct connect</title>
      <link>https://blog.alexmags.com/posts/aws-hardware-vpn-over-direct-connect/</link>
      <pubDate>Mon, 07 Dec 2015 21:53:38 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/aws-hardware-vpn-over-direct-connect/</guid>
      <description>Getting a Direct Connect link to AWS from our colo datacentre was straight forward. Encrypting traffic between colo and AWS via Direct Connect is proving to be more difficult. Although the traffic is logically isolated, we wanted it encrypted as it traverses 3rd party WAN providers.&#xA;This is the best resource I&amp;rsquo;ve come across so far explaining how to setup a VPN over AWS direct connect: https://www.youtube.com/watch?v=SMvom9QjkPk</description>
    </item>
    <item>
      <title>PuppetConf2015 Everything sucks (but then devops)</title>
      <link>https://blog.alexmags.com/posts/everything-sucks-but-then-devops/</link>
      <pubDate>Thu, 05 Nov 2015 22:35:09 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/everything-sucks-but-then-devops/</guid>
      <description>@SadServer at PuppetConf2015 provides a rather depressing view of the state of IT as a combination of crappy software with more crappy software to manage and monitor the crappy software. But there&amp;rsquo;s a ray of hope!&#xA;https://www.youtube.com/watch?v=TBwW2vTKVy4</description>
    </item>
    <item>
      <title>RHEL on Azure. Finally!</title>
      <link>https://blog.alexmags.com/posts/rhel-on-azure-finally/</link>
      <pubDate>Wed, 04 Nov 2015 21:31:55 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/rhel-on-azure-finally/</guid>
      <description>I got a message today from our Red Hat account manager to let me know that Microsoft has signed Red Hat&amp;rsquo;s Certified Cloud Service Provider agreement, meaning that over time they will make available, and be available to host, Red Hat products in Azure.&#xA;RHEL will become the premium Enterprise Linux offering in Azure.&#xA;This is fantastic news for Red Hat Customers. Previously Azure was not a Red Hat Certified Platform.</description>
    </item>
    <item>
      <title>WinOps Conference 2015 videos</title>
      <link>https://blog.alexmags.com/posts/winops-conference-videos/</link>
      <pubDate>Wed, 07 Oct 2015 11:30:54 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/winops-conference-videos/</guid>
      <description>WinOps conference videos have been released:&#xA;Videos: https://www.youtube.com/channel/UCP1OgsLk-HkEdQyhjJX_5JQ Slides: http://www.slideshare.net/WinOpsConf Future Meetups: http://www.meetup.com/WinOps/ Watch the keynote for a &amp;ldquo;state of the industry&amp;rdquo; regarding DevOps on Windows.&#xA;Keynote part 1 https://www.youtube.com/watch?v=wlJo4BLtXyI Keynote part 2 https://www.youtube.com/watch?v=WQZYS5gu6CQ </description>
    </item>
    <item>
      <title>Achieving agility with control in Financial Services on AWS</title>
      <link>https://blog.alexmags.com/posts/achieving-agility-with-control-in-financial-services-on-aws/</link>
      <pubDate>Wed, 16 Sep 2015 19:18:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/achieving-agility-with-control-in-financial-services-on-aws/</guid>
      <description>Attended &amp;ldquo;Achieving agility with control in Financial Services on AWS&amp;rdquo; talk today at AWS Loft London 2015.&#xA;The usual AWS slide of company logos was there for &amp;ldquo;look how many companies use AWS, so it must be safe!&amp;rdquo;. This list wasn&amp;rsquo;t tailored to Financial Services (Tinder, really?). There was a bit about Agility focusing on Continuous Integration (CI also known as automated testing) and Continuous Deployment (CD also known as automated deployment).</description>
    </item>
    <item>
      <title>Work from anywhere?</title>
      <link>https://blog.alexmags.com/posts/work-from-anywhere/</link>
      <pubDate>Sat, 05 Sep 2015 18:26:45 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/work-from-anywhere/</guid>
      <description>Update: THIS WAS 2015 AND PRE COVID&amp;hellip;&#xA;I&amp;rsquo;ve been reading about how distributed companies are operating. Companies with their servers running in the cloud don&amp;rsquo;t need a server room, or Office premises at all it seems. And there&amp;rsquo;s lots of them.&#xA;Wired article about Automatic, the company behind WordPress Lots of information at this clever URL WorkingRemote.ly Article about how Buffer do distributed working The Pros and Cons of Remote Work in Ops As a worker wouldn&amp;rsquo;t you like to skip the commuting?</description>
    </item>
    <item>
      <title>Hashicorp Terraform for Infrastructure as Code</title>
      <link>https://blog.alexmags.com/posts/hashicorp-terraform-for-infrastructure-as-code/</link>
      <pubDate>Tue, 01 Sep 2015 08:30:19 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/hashicorp-terraform-for-infrastructure-as-code/</guid>
      <description>Terraform is a tool by Hashicorp (who do Vagrant, Packer and other ops tools). You maintain a single configuration file and it trues up your environment, creating and deleting machines, to match the configuration file. Their products are coming together into a cohesive suite. The first part describes the Terraform product.&#xA;At 30 mins there&amp;rsquo;s a description of &amp;ldquo;DevOps&amp;rdquo; (that cuts through much of the BS). Basically:&#xA;Developers care about:</description>
    </item>
    <item>
      <title>DevOps on Windows (or any OS)</title>
      <link>https://blog.alexmags.com/posts/devops-on-windows-or-any-os/</link>
      <pubDate>Mon, 31 Aug 2015 08:30:14 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/devops-on-windows-or-any-os/</guid>
      <description>Ahead of the WinOps conference later this month, here&amp;rsquo;s a short presentation about DevOps on any OS (and DevOps in general) by Steve Thair from consultancy The Dev Ops Guys.&#xA;https://blog.dataloop.io/2015/03/31/doxlon-devops-exchange-mar-15-devops-for-windows-an-oxymoron/ http://www.meetup.com/DevOps-Exchange-London/</description>
    </item>
    <item>
      <title>Disable user account control (UAC)</title>
      <link>https://blog.alexmags.com/posts/disable-user-account-control-uac/</link>
      <pubDate>Thu, 27 Aug 2015 06:51:28 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/disable-user-account-control-uac/</guid>
      <description>Quick post about how to disable User Account Control for administrators on servers. Group Policy setting: Computer Configuration &amp;gt; Policies -&amp;gt; Windows Settings -&amp;gt; Security Settings -&amp;gt; Local Policies -&amp;gt; Security Options&#xA;User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode = Elevate withouth prompting User Account Control: Detect application installations and prompt for elevation = Disabled User Account Control: Run all administrators in Admin Approval Mode = Disabled Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA=0</description>
    </item>
    <item>
      <title>DevOps on Windows Conference</title>
      <link>https://blog.alexmags.com/posts/devops-on-windows-conference/</link>
      <pubDate>Thu, 20 Aug 2015 21:11:40 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/devops-on-windows-conference/</guid>
      <description>The WinOps conference will take place 22 September 2015 in London. The agenda is now up at http://winops.org/. What, you though DevOps was only for Linux? </description>
    </item>
    <item>
      <title>Adding compute nodes to Microsoft HPC Pack 2012 R2</title>
      <link>https://blog.alexmags.com/posts/adding-compute-nodes-to-microsoft-hpc-pack-2012-r2/</link>
      <pubDate>Thu, 20 Aug 2015 20:10:44 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/adding-compute-nodes-to-microsoft-hpc-pack-2012-r2/</guid>
      <description>I hit a stumbling block with adding compute nodes to new HPC cluster. If you see the following errors when deploying Microsoft HPC Pack 2012 R2 when joining compute nodes to the cluster:&#xA;HPC Node Manager Service unreachable and&#xA;System.Runtime.Remoting.RemotingException: An error occurred while processing the request on the server: System.Runtime.Remoting.RemotingException: User identity is not authorized to connect to this endpoint The solution is to add your installation credentials to the administrators group before install HPC pack on compute nodes.</description>
    </item>
    <item>
      <title>Microsoft Deployment Toolkit (MDT) Image Bakery</title>
      <link>https://blog.alexmags.com/posts/microsoft-deployment-toolkit-image-bakery/</link>
      <pubDate>Mon, 10 Aug 2015 18:29:46 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/microsoft-deployment-toolkit-image-bakery/</guid>
      <description>Updating the disk images used by MDT I&amp;rsquo;ve been working on a project to set up an Amazon Web Services AMI bakery and thought its time to update the disk images used by Microsoft Deployment Toolkit too. The time to install patches during deployment was getting crazy. The process to update MDT images is:&#xA;(PXE) Boot WinPE (from WDS server or some other TFTP source) Format and partition disk install OS install core software to be included in image (eg Office or SNMP), install updates (for OS and Microsoft apps) SysPrep Boot into WinPE &amp;amp; Capture image (WIM) Shutdown Start with a regular client/server template and add a capture stage to the end of the task sequence.</description>
    </item>
    <item>
      <title>Bitlocker encrypted? Reporting on Bitlocker machine account properties</title>
      <link>https://blog.alexmags.com/posts/bitlocker-encrypted-reporting-on-bitlocker-machine-account-properties/</link>
      <pubDate>Tue, 04 Aug 2015 12:42:29 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/bitlocker-encrypted-reporting-on-bitlocker-machine-account-properties/</guid>
      <description>Query for Bitlocker recovery keys (properties of machines) and then getting the owner of key. Using the useful (and free) Quest ActiveRoles commandlets but you can do this with regular activedirectory powershell module too. add-pssnapin quest.activeroles.admanagement -ErrorAction Silentlycontinue $DesktopsOU= &amp;#34;OU=Win7,OU=Workstations,DC=companyname,DC=com&amp;#34; # or whatever your machine OU is Get-QADObject -SizeLimit 0 -IncludedProperties Name,ParentContainer -SearchRoot $DesktopsOU | Where-Object {$_.type -eq &amp;#34;msFVE-RecoveryInformation&amp;#34;} | Foreach-Object {Split-Path -Path $_.ParentContainer -Leaf} | Select-Object -Unique The following page links to a script which will give you a CSV report http://blog.</description>
    </item>
    <item>
      <title>Presented at AWS UG UK meetup</title>
      <link>https://blog.alexmags.com/posts/presented-at-aws-ug-uk-meetup/</link>
      <pubDate>Thu, 30 Jul 2015 10:04:12 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/presented-at-aws-ug-uk-meetup/</guid>
      <description>I presented at AWS User Group UK meetup on Hybrid deployments and High Performance Computing.&#xA;https://www.youtube.com/watch?v=jvVEldPLmnM http://www.meetup.com/AWSUGUK/events/206136202/</description>
    </item>
    <item>
      <title>AWS VPC peering and direct connect</title>
      <link>https://blog.alexmags.com/posts/aws-vpc-peering-and-direct-connect/</link>
      <pubDate>Tue, 14 Jul 2015 19:08:40 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/aws-vpc-peering-and-direct-connect/</guid>
      <description>So it turns out AWS isn&amp;rsquo;t so Enterprise friendly. If you plan to start using Amazon AWS as an extension to your datacentre, be aware that you better put everything in one VPC (July 2015).&#xA;Systems in peered VPCs are not accessible from corporate network over AWS VPN or Direct Connect :-(&#xA;Be aware of limitations on transiting VPCs in your cloud networking designs.&#xA;http://docs.aws.amazon.com/AmazonVPC/latest/PeeringGuide/invalid-peering-configurations.html#edge-to-edge-vgw</description>
    </item>
    <item>
      <title>AWS API without keys</title>
      <link>https://blog.alexmags.com/posts/aws-api-without-keys/</link>
      <pubDate>Thu, 02 Jul 2015 21:25:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/aws-api-without-keys/</guid>
      <description>Hey there Enterprise Administrator! Avoid storing AWS API keys by using Windows authentication instead[/caption]&#xA;Are you an Enterprise investigating AWS? Don’t want to become a security news story like these guys? https://www.google.co.uk/search?q=news+aws+secret+access+key+hack Are you used to multiple levels of physical and logical security for access to your equipment? https://www.youtube.com/watch?v=_qc5TG2ulx8 Is access to your VPC config shielded by nothing but some AWS API credentials? (which are probably stored in plain text..) Can your AWS credentials be used from the public internet (instead of only from the Office)?</description>
    </item>
    <item>
      <title>AD Authentication for AWS console</title>
      <link>https://blog.alexmags.com/posts/ad-authentication-for-aws-console/</link>
      <pubDate>Mon, 15 Jun 2015 21:22:21 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/ad-authentication-for-aws-console/</guid>
      <description>When you get started with Amazon Web Services (AWS) one thing to do early is secure access to the web console. Rather than manage another set of user accounts you can reuse your corporate directory (Microsoft Active Directory) to login to the AWS console. You use AD Federation Services to do this. Also, if you keep your ADFS server internal, then your AWS console is not accessible from the public Internet.</description>
    </item>
    <item>
      <title>Windows Authentication in Blackberry Enterprise Server (BES) 12</title>
      <link>https://blog.alexmags.com/posts/windows-authentication-in-blackberry-enterprise-server-bes-12/</link>
      <pubDate>Wed, 22 Apr 2015 20:30:47 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/windows-authentication-in-blackberry-enterprise-server-bes-12/</guid>
      <description>Update to previous post on older BES version ( &amp;ldquo;Test intranet access from Blackberry and other mobile platforms&amp;rdquo;). For BES12 create a krb5.conf file and upload to the &amp;ldquo;Single-sign on&amp;rdquo; profile (obv. switch mycompany.com to your own FQDN. And specify the FQDNs for one or more domain controllers. This has been case sensitive in the past.)``` [libdefaults] default_etypes = aes256-cts-hmac-sha1-96 aes128-cts-hmac-sha1-96 des3-cbc-sha1 des3-cbc-sha rc4-hmac default_realm = MYCOMPANY.COM [realms] MYCOMPANY.COM = { kdc = tcp/DC1.</description>
    </item>
    <item>
      <title>Amazon Web Services (AWS) online training</title>
      <link>https://blog.alexmags.com/posts/amazon-web-services-aws-online-training/</link>
      <pubDate>Tue, 07 Apr 2015 14:15:13 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/amazon-web-services-aws-online-training/</guid>
      <description>My head in the clouds as usual. Today I passed the AWS Certified Solutions Architect - Associate exam. I used Ryan Kroonenburn&amp;rsquo;s course on Udemy to skill up. I recommend it: Udemy - AWS Certified Solutions Architect associate by Ryan Kroonenburn&#xA;Update: Ryan quit Udemy&amp;rsquo;s platform and setup his own by founding https://www.ACloudGuru.com</description>
    </item>
    <item>
      <title>100 days of DevOps</title>
      <link>https://blog.alexmags.com/posts/100-days-of-devops/</link>
      <pubDate>Sat, 28 Mar 2015 18:54:36 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/100-days-of-devops/</guid>
      <description>Came across this amazing body of work. These guys (a group of System Centre consultants) spent 100 days on automation tools across Windows and Linux and also AWS and Azure cloud services.&#xA;PowerShell DSC – from Basic to Advanced Cross-Platform Management and DevOps with DSC and Chef Package Deployment Azure PaaS (Cloud Services, Websites and SQL) for IT Pros Source Control and Unit Testing Integration and Automation for IT Pros (TFS, VSO and GIT) System Center and DevOps Amazon EC2 and PowerShell Well written, concise, high level overviews to wet your appetite.</description>
    </item>
    <item>
      <title>Windows Server 2012 nic teaming with powershell</title>
      <link>https://blog.alexmags.com/posts/nic-teaming-powershell/</link>
      <pubDate>Tue, 17 Mar 2015 19:22:58 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/nic-teaming-powershell/</guid>
      <description>Some PowerShell to configure Nic Teaming on Windows Server 2012. Note: pick teaming mode and load balancing algorithm to suit your networking environment. The config below is for two NICs going to independent switches in active-passive mode (no LACP). Also note that the order Windows discovers and labels NICs may not match your hardware vendor&amp;rsquo;s labelling at the back of the server.&#xA;# Check current state of NICs and do teaming if (get-netLbfoTeam) {write-host &amp;#34;Nic Team already exists&amp;#34;} else { write-host &amp;#34;Renaming NICs&amp;#34; #Rename Ethernet &amp;amp; Ethernet2 to Nic1 &amp;amp; Nic2 etc $nicIndex=1 get-netAdapter | ForEach-Object { $\_ | Rename-NetAdapter -NewName &amp;#34;Nic$nicIndex&amp;#34; ; $nicIndex++} #Create team for Nic1,2 write-host &amp;#34;Teaming Nic1 and Nic2&amp;#34; $team = new-netlbfoteam -name NicTeam -teammembers Nic1,Nic2 -TeamingMode **SwitchIndependent** -loadBalancingAlgorithm **TransportPorts** -Confirm:$false #Configure NIC2 as standby write-host &amp;#34;Configuring Nic2 as standby&amp;#34; Set-NetLbfoTeamMember -Name &amp;#34;Nic2&amp;#34; -AdministrativeMode Standby # loop until this NIC team is up while ($team.</description>
    </item>
    <item>
      <title>Windows Network List Manager</title>
      <link>https://blog.alexmags.com/posts/windows-network-list-manager/</link>
      <pubDate>Sat, 14 Mar 2015 19:23:12 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/windows-network-list-manager/</guid>
      <description>Hide Select a location for the network When you deploy Windows 7 you get a prompt: &amp;ldquo;Select a location for the network&amp;rdquo;. Laptop users also see this when they connect to a new network or WIFI service. You must pick the local network type. This helps Windows firewall decide if the local network is trusted (Private) or untrusted (Public). Rather than leave this as a manual choice for PC deployment staff and laptop users, you can automate this.</description>
    </item>
    <item>
      <title>Powershell to disable NetBIOS over TCP/IP</title>
      <link>https://blog.alexmags.com/posts/powershell-to-disable-netbios-over-tcpip/</link>
      <pubDate>Thu, 12 Mar 2015 19:15:07 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/powershell-to-disable-netbios-over-tcpip/</guid>
      <description>You don&amp;rsquo;t need your machines talking to each other via NetBIOS over TCP/IP.&#xA;Turn this off to cut down on network chatter and reduce your attack surface. The following PowerShell is useful as step during OS deployment (one-off config), or as a Group Policy startup script (every boot). # disable NetBIOS over TCP/IP on new adapter (legacy protocol not required) $NETBIOS_DISABLED=2 Get-WmiObject Win32_NetworkAdapterConfiguration -filter &amp;#34;ipenabled = &amp;#39;true&amp;#39;&amp;#34; | ForEach-Object { $_.</description>
    </item>
    <item>
      <title>Remote desktop protocol 8.1</title>
      <link>https://blog.alexmags.com/posts/remote-desktop-protocol-8-1/</link>
      <pubDate>Mon, 02 Mar 2015 21:11:48 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/remote-desktop-protocol-8-1/</guid>
      <description>TL;DR Make RDP better on Win7. Enable UDP support with this update.&#xA;Add support for RDP 8.1 to Windows 7. Both an updated RDP client (useful when connecting to Windows Server 2012) and updates for the terminal server service. http://blogs.msdn.com/b/rds/archive/2013/11/12/remote-desktop-protocol-8-1-update-for-windows-7-sp1-released-to-web.aspx There are quite a few hotfix prerequisites that took a while to install. I found it quicker to extract the cab files from within the MSU hotfix files (used 7zip) and install using dism.</description>
    </item>
    <item>
      <title>Web proxy auto detection</title>
      <link>https://blog.alexmags.com/posts/web-proxy-auto-detection-2/</link>
      <pubDate>Mon, 16 Feb 2015 22:40:16 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/web-proxy-auto-detection-2/</guid>
      <description>If you have proxy servers between your staff and the public internet, and you&amp;rsquo;re configuring the proxy server name/IP and port in web browsers then&#xA;CUT THAT OUT RIGHT NOW!&#xA;Your web browsers can find your proxy servers automatically (with a little help&amp;hellip;.)&#xA;What is Web Proxy Autodiscovery Protocol (WPAD)? The Web Proxy Autodiscovery Protocol (WPAD) is a method used by web clients (IE, Firefox, Chrome, Winodws) to locate an internet proxy automatically.</description>
    </item>
    <item>
      <title>OS Hardening guides</title>
      <link>https://blog.alexmags.com/posts/os-hardening-guides/</link>
      <pubDate>Mon, 16 Feb 2015 22:15:43 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/os-hardening-guides/</guid>
      <description>In the bad old days Windows would install in user friendly, super accessible mode. You&amp;rsquo;d then run scripts to lock it down, improving security permissions on registry keys, files and folders, reg tweaks, and potentially break stuff too. There were lots of security guides around. I&amp;rsquo;d use these NSA guides and tips from McGraw Hill&amp;rsquo;s Hacking Exposed. Now days Windows comes secure out of the box and you install roles before it&amp;rsquo;ll do anything.</description>
    </item>
    <item>
      <title>Lost the administrator password? Break into Windows</title>
      <link>https://blog.alexmags.com/posts/lost-the-administrator-password-break-into-windows/</link>
      <pubDate>Tue, 20 Jan 2015 22:14:51 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/lost-the-administrator-password-break-into-windows/</guid>
      <description>If you come across a machine that has disconnected from the domain, and you don&amp;rsquo;t have a system to recover the local administrator password, you&amp;rsquo;ll need to break in. If you have physical access to the machine, and can access the OS files from another OS (disk is not encrypted), then you can make offline changes to Windows. Boot into your Windows Preinstallation Environment (WinPE), typically used for OS deployment. See Microsoft Deployment Toolkit.</description>
    </item>
    <item>
      <title>IT Infrastructure Directions in 2015</title>
      <link>https://blog.alexmags.com/posts/2015directions/</link>
      <pubDate>Tue, 20 Jan 2015 21:58:22 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/2015directions/</guid>
      <description>A recent Microsoft TechNet Flash email links to a Forrester report about what CIOs should be doing in 2015. Part of it mentions hybrid cloud architectures (read Azure) Forrester Research Predictions 2015: CIOs Accelerate the Business Technology Agenda&#xA;&amp;ldquo;In 2015, digital disruption will change the nature of competition, forcing firms to obsess about creating superior digital experiences across the entire customer life cycle. Many CIOs have the technical expertise and cross-functional business purview to help drive this level of innovation, but they are too often still seen as nothing more than the leader of a cost centre.</description>
    </item>
    <item>
      <title>Test intranet access from Blackberry and other mobile platforms</title>
      <link>https://blog.alexmags.com/posts/test-intranet-access-from-blackberry-and-other-mobile-platforms/</link>
      <pubDate>Fri, 02 Jan 2015 19:07:29 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/test-intranet-access-from-blackberry-and-other-mobile-platforms/</guid>
      <description>If you&amp;rsquo;re accessing intranet websites using Blackberries and other mobile platforms like Good for Enterprise you can get Kerberos working to provide single sign-on/passthough authentication. Staff can then browse intranet pages that are secured by Windows authentication, URL filtering or NTFS without having to type in their (probably complex) Windows password on a teeny tiny phone keypad.&#xA;I use the Active Server Page (ASP) below on IIS to test if Kerberos is working.</description>
    </item>
    <item>
      <title>VMware View Client as desktop shell</title>
      <link>https://blog.alexmags.com/posts/vmware-view-client-as-desktop-shell/</link>
      <pubDate>Tue, 30 Dec 2014 18:20:30 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/vmware-view-client-as-desktop-shell/</guid>
      <description>You can repurpose Windows PCs as thin clients in a VMware View VDI environment. Swap the Windows explorer shell (start menu and desktop) with View Client. This also works for Windows Embedded thin clients. This works best with VMware View Client v5.4.0. Newer versions (View Client 2.0 and above, don&amp;rsquo;t ask me why the version numbers are out of order) VMware changed the View Client behaviour. When you disconnect from your VDI session, the View Client doesn&amp;rsquo;t close (so Windows doesn&amp;rsquo;t logoff).</description>
    </item>
    <item>
      <title>Package - Java Runtime Environment (JRE)</title>
      <link>https://blog.alexmags.com/posts/package-java-runtime-environment-jre/</link>
      <pubDate>Tue, 30 Dec 2014 18:04:53 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/package-java-runtime-environment-jre/</guid>
      <description>JRE install/reinstall package This will help you do unattended install of JRE. JRE is a little tricky as there are several major versions. There are 32bit and 64bit editions. There are regular updates. And there are plenty of security vulnerabilities that need patching regularly, especially the java plug-in for web browsers. Currently Oracle release JRE updates every quarter and this needs to become more frequent. As a result you need good version control for your packages and reliable install and upgrades.</description>
    </item>
    <item>
      <title>Shower Booking System</title>
      <link>https://blog.alexmags.com/posts/shower-booking-system/</link>
      <pubDate>Sat, 27 Dec 2014 16:53:30 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/shower-booking-system/</guid>
      <description>Once in a while a request will come in from left field. This was one of them: implement a shower booking system for the new office.&#xA;I implemented a finite state machine, using XML to store state, and XSLT to transform from one state to another. XSLT to transform the state file to HTML views. And a little ASP to implement webhooks to kick off the transforms.</description>
    </item>
    <item>
      <title>Building a VDI infrastructure</title>
      <link>https://blog.alexmags.com/posts/overview-of-building-a-vdi-infrastructure/</link>
      <pubDate>Fri, 19 Dec 2014 12:46:45 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/overview-of-building-a-vdi-infrastructure/</guid>
      <description>This seminar describes a Virtual Desktop Infrastructure (VDI) using only open source software (and a Windows desktop OS). This is of course a crazy thing to attempt. You&amp;rsquo;re more likely to pick an off-the-shelf products like VMware Horizon View or Citrix. The most interesting aspect of this seminar is that it explains the components of a VDI infrastructure and the challenges in making an OS designed for local disk work well in a VDI environment and shared storage.</description>
    </item>
    <item>
      <title>Website change alerts with powershell</title>
      <link>https://blog.alexmags.com/posts/website-change-alerts-with-powershell/</link>
      <pubDate>Thu, 18 Dec 2014 12:50:06 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/website-change-alerts-with-powershell/</guid>
      <description>Had a requirement to monitor a website for changes. Used free online tool www.changedetection.com. But set up a second monitoring tool using PowerShell and a scheduling system. Remix the following code in your own monitoring projects. Maybe turn it into a function. Maybe test for an expected string (eg the HTML for login form). There&amp;rsquo;s no defensive code to recover if the website is inaccessible (needs a try-catch there). Could add some code to raise a SNMP trap, or create a support ticket.</description>
    </item>
    <item>
      <title>Business aims vs Technology aims</title>
      <link>https://blog.alexmags.com/posts/business-aims-vs-technology-aims/</link>
      <pubDate>Wed, 05 Nov 2014 14:08:19 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/business-aims-vs-technology-aims/</guid>
      <description>At a conference yesterday there was the results of a survey into business and IT dept priorities and a discussion around how they differ: Business Priorities&#xA;1.Improving Efficiency&#xA;2.Deliver Operational Results&#xA;3.Improve Profitability&#xA;4.Reduce Enterprise Costs&#xA;5.Attract and Retain Customers&#xA;6.Product and Service Innovation&#xA;7.New markets and territories&#xA;8.Attract and Retain Personnel&#xA;9.Marketing and Sales Effectiveness&#xA;10.Increasing Enterprise Growth&#xA;IT Priorities&#xA;1.Security&#xA;2.Mobile Technology&#xA;3.High Availability/Disaster Recovery&#xA;4.Storage and Data Growth</description>
    </item>
    <item>
      <title>Using Microsoft NetMon to troubleshoot application network communications</title>
      <link>https://blog.alexmags.com/posts/using-microsoft-netmon-to-troubleshoot-application-network-communications/</link>
      <pubDate>Tue, 21 Oct 2014 14:30:08 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/using-microsoft-netmon-to-troubleshoot-application-network-communications/</guid>
      <description>Recently showed NetMon to a developer for troubleshooting IntelliJ. The Java development environment app was freezing and we found it was attempting to go direct to Maven central repository instead of our internal repository or out via the web proxy. NetMon is a network capture tool. Rather than showing you raw data like wireshark, it breaks down the traffic into &amp;ldquo;conversations&amp;rdquo; per process (and process ID). This makes it easier to see the forest for the trees, or the tree you&amp;rsquo;re interested in instead of the whole forest.</description>
    </item>
    <item>
      <title>PowerShell update-help proxy authentication</title>
      <link>https://blog.alexmags.com/posts/proxy-access-from-powershell/</link>
      <pubDate>Tue, 16 Sep 2014 14:43:55 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/proxy-access-from-powershell/</guid>
      <description>PowerShell 3 installs without help files. You download these from Microsoft using the command update-help. Use the following PowerShell to make the .Net web client pass your session credentials to the (auto detected) proxy. Now you can wget, curl or update-help&#xA;$wc = New-Object System.Net.WebClient $wc.Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials update-help This tip was from_:_ http://blog.stangroome.com/2013/08/02/powershell-update-help-and-an-authenticating-proxy/</description>
    </item>
    <item>
      <title>The 10 Immutable Laws of Security</title>
      <link>https://blog.alexmags.com/posts/the-10-immutable-laws-of-security/</link>
      <pubDate>Mon, 30 Jun 2014 14:49:52 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/the-10-immutable-laws-of-security/</guid>
      <description>Attended a security webinar titled 11 Most Effective Ways to Lockdown Active Directory. The 10 Immutable Laws of Security was referenced (in the context of VMware admins having equivalent of physical access to VMs, law #3).&#xA;Law #1: If a bad guy can persuade you to run his program on your computer, it&amp;rsquo;s not solely your computer anymore.&#xA;Law #2: If a bad guy can alter the operating system on your computer, it&amp;rsquo;s not your computer anymore.</description>
    </item>
    <item>
      <title>Atlassian Confluence 5</title>
      <link>https://blog.alexmags.com/posts/atlassian-confluence-5/</link>
      <pubDate>Thu, 19 Jun 2014 14:56:02 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/atlassian-confluence-5/</guid>
      <description>I migrated the awesome intranet WIKI system Confluence from v4 on Linux to v5 on Windows. This was not straight forward (it was hell) but it&amp;rsquo;s now working great. As a JAVA based app it runs fine on Windows and it&amp;rsquo;s easier to support on this platform (IMHO). Some findings/gotchas:&#xA;Confluence config settings All references to setenv.bat in Atlassian docs should be ignored. Making JVM config changes to this file has no impact.</description>
    </item>
    <item>
      <title>.Net application publisher certificate checking</title>
      <link>https://blog.alexmags.com/posts/net-application-publisher-certificate-checking/</link>
      <pubDate>Mon, 09 Jun 2014 15:34:59 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/net-application-publisher-certificate-checking/</guid>
      <description>Have a server app (NetApp SnapDrive 7) which installs a .Net service. The service fails to start and the MSI package rolls back. It fails to start because it’s doing publisher cert checking and the servers don’t have internet access via proxy. The workaround offered was to edit the app .config file and add Described in this article: http://msdn.microsoft.com/en-us/library/bb629393(v=vs.110).aspx&#xA;And: http://msdn.microsoft.com/en-us/library/system.security.permissions.publisheridentitypermission(v=vs.110).aspx&#xA;Found this cert check can be turned off per machine in machine.</description>
    </item>
    <item>
      <title>Benchmarking Physical Machines Vs HyperV VMs</title>
      <link>https://blog.alexmags.com/posts/benchmarking-physical-machines-vs-hyperv-vms/</link>
      <pubDate>Fri, 06 Jun 2014 15:41:11 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/benchmarking-physical-machines-vs-hyperv-vms/</guid>
      <description>SQL Enterprise licence cost avoidance Microsoft SQL Server Enterprise edition licensing changed from per-server (and CALs) to per-core. This makes SQL Server Enterprise on our 16 core blade servers very expensive to licence. To workaround this licencing cost we bought 8 core servers with a higher clock speed.&#xA;TL;DR - Save money on SQL Enterprise licensing by choosing fewer cores with faster clock speed.&#xA;Benchmarked the new 8 cores @3.5GHz SQL server hardware vs our previous SQL server hardware.</description>
    </item>
    <item>
      <title>Trader Virtual Desktop Infrastructure (VDI)</title>
      <link>https://blog.alexmags.com/posts/trader-virtual-desktop-infrastructure-vdi/</link>
      <pubDate>Sun, 20 Apr 2014 15:35:55 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/trader-virtual-desktop-infrastructure-vdi/</guid>
      <description>My first trader VDI setup.&#xA;A remoted desktop environment with two machines per trader, one keyboard and mouse, and up to 8 screens. Historically traders had two machines: One (trading machine) ring-fenced for Bloomberg and trading, and a second (non-trading machine) for MS Office, surfing the web, some 3rd party apps etc.. They would swap between the machines using KVM switch boxes. We switched to a VDI style solution where the trader&amp;rsquo;s machines are moved to the datacentre and accessed via a &amp;rsquo;thin client&amp;rsquo; terminal.</description>
    </item>
    <item>
      <title>IT Department Agility</title>
      <link>https://blog.alexmags.com/posts/it-department-agility/</link>
      <pubDate>Mon, 14 Apr 2014 16:08:54 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/it-department-agility/</guid>
      <description>Our development team have adopted the AGILE project management methodology. Along with new continuous testing tools they&amp;rsquo;re able to implement changes much more quickly now. They&amp;rsquo;re now finding the next barrier to agility is us, the IT operations department (the ops in DevOps). We can&amp;rsquo;t rollout software as fast as they release is. Ideally IT Operations would be able to deploy their changes within a single AGILE sprint cycle (the dev cycle).</description>
    </item>
    <item>
      <title>SharePoint stretched farm</title>
      <link>https://blog.alexmags.com/posts/sharepoint-stretched-farm/</link>
      <pubDate>Wed, 02 Apr 2014 17:16:03 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/sharepoint-stretched-farm/</guid>
      <description>Installed SharePoint as a Google like search engine for documents on filers. Configuring it as a stretched farm (servers in multiple sites) with a SQL backend. This is overkill for a search site, but makes it possible to failover SharePoint to DR site an will be useful if it&amp;rsquo;s used as a doc library in future, or for SQL 2014 data analytics. Also SharePoint automatically shares the indexing work between servers in a farm.</description>
    </item>
    <item>
      <title>MATLAB Optimised Desktop Platform</title>
      <link>https://blog.alexmags.com/posts/researcher-desktop-optimised-for-matlab/</link>
      <pubDate>Thu, 27 Mar 2014 15:38:50 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/researcher-desktop-optimised-for-matlab/</guid>
      <description>Some of our the desktop hardware used by researchers was getting to end of life. Simulations within MATLAB required more RAM. Our desktops ground to a halt when simulations exceeded physical RAM and the OS began swapping pages of memory to disk. The desktops had 16GB and 32GB of RAM but researchers wanted 64GB. Upgrading desktops to 64GB RAM would cost £3000 per PC. £500 for RAM and £2500 for Workstation class hardware (Intel Xeon required to accommodate &amp;gt;32GB RAM) To pick a new MATLAB desktop hardware platform I profiled the application using SysInternal Process Monitor to expose how the app used CPU, RAM and the Network interface.</description>
    </item>
    <item>
      <title>Audit Microsoft and Linux licensing with Microsoft MAP</title>
      <link>https://blog.alexmags.com/posts/audit-microsoft-and-linux-licensing-with-microsoft-map/</link>
      <pubDate>Tue, 18 Mar 2014 17:31:44 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/audit-microsoft-and-linux-licensing-with-microsoft-map/</guid>
      <description>The Microsoft Migration and Assessment Planning (MAP) tool was originally designed to help you plan your migration to HyperV. But the reports it generates are also very useful for the annual Microsoft licensing true-ups.&#xA;https://www.microsoft.com/map https://www.microsoft.com/en-us/download/details.aspx?id=7826&#xA;It can now audit Linux too (with a view to virtualising it on HyperV/Asure) http://blogs.technet.com/b/mapblog/archive/2013/01/29/determine-linux-machine-readiness-to-move-to-a-windows-azure-virtual-machine-using-the-map-toolkit.aspx&#xA;Next time you need to gather data for Microsoft licensing, check out The Microsoft Migration and Assessment Planning (MAP) tool.</description>
    </item>
    <item>
      <title>Boot WinPE on VMs without virtual media or PXE</title>
      <link>https://blog.alexmags.com/posts/boot-winpe-on-vms-without-virtual-media-or-pxe/</link>
      <pubDate>Thu, 13 Mar 2014 17:35:28 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/boot-winpe-on-vms-without-virtual-media-or-pxe/</guid>
      <description>Deploying VMs from templates harks back to the bad old days of disk imaging. But using &amp;ldquo;baremetal templates&amp;rdquo; ensures your virtual hardware configuration is consistent (choice of NIC, choice of array controller, disk is thin provisioned etc..). Then make a baremetal template that boots straight into WinPE for unattended OS deployment. Then you get consistent VM hardware config without maintaining a distributing OS disk images.&#xA;Create VM template or factory image with WinPE on harddisk Create VM with required virtual hardware configuration</description>
    </item>
    <item>
      <title>VDI with VMware View</title>
      <link>https://blog.alexmags.com/posts/vdi-with-vmware-view/</link>
      <pubDate>Mon, 03 Mar 2014 22:46:40 +0000</pubDate>
      <guid>https://blog.alexmags.com/posts/vdi-with-vmware-view/</guid>
      <description>The traders with 6 screens and two machines each needed a more elaborate VDI system (see my rgs post). But for the back office, with a mere two screens each, I deployed VMware Horizon View. I&amp;rsquo;ve upgraded though View 3, 4 and 5 and expect to upgrade to View 6 soon. We have mixture of HP thin clients and repurposed PCs (Vmware view client as shell). With a little VDI optimisation Windows 7 will work great in a VDI environment.</description>
    </item>
  </channel>
</rss>
