We were setting up a NetScaler to load balance the Exchange 2013 CAS protocols a few weeks ago and we had an interesting dilemma.  The client had mandated the use of Certificate-Based Authentication (CBA) when accessing Exchange ActiveSync from mobile devices and wanted to leverage their NetScaler appliances to provide high availability for their Exchange…

Read More

Admins who run Windows on their desktop or laptop computer can use the AWS Tools for Windows PowerShell to perform their Amazon Web Services administration. Installing the AWS Tools for Windows PowerShell The pre-requisites for the AWS Tools for Windows PowerShell are minimal. Windows XP or later, with PowerShell 2.0 or later, is the requirement,…

Read More

Here at Idea 11 we’re big fans of PowerShell. We use it every day to support our customers and develop scripts and tools to help with our services and support. When you spend as much time in PowerShell as we do it is useful to create a PowerShell profile. A PowerShell profile is simply a…

Read More

The introduction of ‘pay for what you use’ and ‘pay as you go’ consumption models in cloud infrastructure are a dramatic departure from the traditional capital budgeting process that has underpinned decades of previous IT projects. Many business and IT managers are currently evaluating a cloud project and in weighing up the benefits on offer…

Read More

The Threat Prevention feature of Palo Alto Networks firewalls protects your network in several ways. One of these is an Intrusion Prevention System (IPS) that enables you to block known vulnerabilities at the network gateway. This approach to intrusion prevention helps to protect your network by detecting and blocking known attack signatures for security vulnerabilities. A recent example…

Read More

A new security vulnerability called Shellshock has been discovered. Security experts are already calling it one of the most serious vulnerabilities of all time, even more serious than Heartbleed. The Shellshock vulnerability is present in Bash, a remote shell commonly used to remotely administer Linux-based systems. This includes many Linux distributions that are used for…

Read More

Let’s dive into building systems that build themselves. Sound complicated? It’s not. And making the switch can unlock some huge efficiency and flexibility improvements in your environment. Too much secret sauce Traditionally you build a system by gathering the recommended specifications from your software vendor or dev team, perform some sizing and then install your…

Read More

Since the introduction of Windows 2000, IT departments have used group policies to control and configure workstations. A corporate workstation build will typically contain the operating system, service packs and hotfixes and core applications common to all user groups – Microsoft Office, Adobe Reader, and the like. Whilst some configuration of the base build is…

Read More