TPM Security Processor Troubleshooting Guide

Status  The first step of troubleshooting Trusted Platform Module (TPM) errors is to review the status of the security processor.   Windows 10   Go to Settings -> Update & Security -> Device Security -> Security Processor Details  Or Type “TPM” in the search box and select Security Processor Details  Or run Get-TPM in an administrator PowerShell console.   Any […]

PowerShell: List Microsoft 365 Accounts that do not have MFA Enforced

Microsoft’s 365 enrollment has three states: Enabled, Enforced, and Disabled. Enabled means that a user has, or will be prompted to enroll for multi-factor authentication. However, if they do not complete the enrollment and you do not have any type of enforcement policy, the account will continue to be authenticated without MFA. Once a person […]

Mobile Security the Easy Way, Setup Intune Mobile Application Management

Several of the solutions for controlling mobile data on the market claim to have an easy solutions, but only one of them has impressed me. Microsoft’s Intune Endpoint Device Manager is extremely robust and very complicated. However, if you forget about trying to push apps and manage user profiles for now and concentrate on securing […]

ASUS TUF DASH F15 an Underrated Nvidia 3070 RTX Gaming Laptop

I’ve have owned so many laptops that I’ve literally lost count. Some of those systems, like my Surface Book, are capable of playing games. However, none of them are, or were, dedicated game machines. I’ve helped my friends and family pick out their portable game machines and have spent plenty of hours playing on them. […]

Hyper-V NAT: Remote Access to Windows and Linux Virtual Machines

I’ve written several posts on creating Hyper-V virtual machines on Windows 10. One of my most popular covers how to create a Linux VM with sound. Inevitably, somebody will follow up with a question along the lines of, “How do I access XRDP (Linux RDP Server) from other machines on my network?” One might be […]

Troubleshoot and Control Outlook Notifications for Shared Objects

If there’s one thing Outlook really likes to do, it is to make sure that you are notified. Sometimes it can be a little overbearing, especially if you are a member of very many shared mailboxes, a room delegate, or have full access to another individual’s mailbox. You will get all of those notifications too. […]

The Brydge 12.9 Pro+ iPad Keyboard

What do you get your wife who has everything for Valentine’s Day? Sure you could go with the standard flowers or candy and my wife would be more than happy with that choice. However, I’ve noticed that she’s been borrowing my Surface Go more and more lately. Mostly due to needing a keyboard and trackpad […]

Accidental MFA Bypass in Fortinet Devices

Due to a misunderstanding of a poorly designed form it is easy to allow LDAP to bypass Fortitokens or other MFA technologies when implemented on Fortigate VPNs. In a Fortigate VPN configuration, you create an inbound rule to allow VPN tunnel access. That rule specifies the source objects and groups that have access to the […]