Application Masking with FSLogix in Windows Virtual Desktop

With FSLogix, you can mask applications based on Users, Groups, OU, Computers and registry settings.  This video reviews specific of FSLogix and then applies app masking rules to a WVD host pool.

Continue reading “Application Masking with FSLogix in Windows Virtual Desktop”

Change .PDF Default from Edge to Adobe Reader in Windows 10


If you found this post, you are probably facing a frustrating and persistent issue, changing the default program to open Adobe PDF files from Microsoft Edge to Adobe Reader in Windows 10.  The best option would be to remove Microsoft Edge since the primary purpose of Edge is to download Chrome.  But, as you probably have already found, that’s not an option.

Continue reading “Change .PDF Default from Edge to Adobe Reader in Windows 10”

Use Splunk to Collect Logs from Office 365 and Azure AD

Microsoft has a lot of options to view Azure log data in one form or another. There is the Security Center, Azure Sentinel, Log Analytics, and Insights.  This is fine for an Azure centric organization, but many organizations already have log collection systems in place such as Splunk, and using multiple logging platforms is not efficient.  This article walks through sending Azure AD and Office 365 logs to Splunk.

Continue reading “Use Splunk to Collect Logs from Office 365 and Azure AD”

CompTIA CTT+ Certification

Why

Over the past couple of years, I have created a sizeable amount of content on YouTube and Blog and have been lucky enough to speak at some wonderful user groups and other events.  The format of this content is based on replicating what I enjoy when I consume similar content.  Imitation is the greatest form of flattery, right?

Continue reading “CompTIA CTT+ Certification”

Azure Privileged Identity Management (PIM) For Beginners

Azure Privileged Identify Management, or PIM, is a Microsoft service that enables management, control and monitoring of privileged access in Azure.  In this video, I give you an introduction to Azure PIM.  We go over the basics of on boarding a user to PIM, adding a user for active and eligible access, activating an eligible role, requiring an activation approval on a role and creating access reviews.