Configure-Internet-Site-Zone-using-Group-Policy-Preferences-5.png

Configure Internet Site Zone using Group Policy Preferences

Microsoft Internet Explorer has a built-in security feature that classify sites into four separated zones, namely Internet, Local Intranet, Trusted Sites, and Restricted Sites. Each of these zones has different way of handling site contents. For example, downloading content from sites in Internet zone will prompt a message to the user before it is able […]

Configure-Windows-Firewall-Rule-using-Group-Policy-4.png

Configure Windows Firewall Rule using Group Policy

Every Windows OS comes with a native firewall as the basic protection against malicious programs. Windows Firewall controls the incoming and outgoing traffic from and to the local system based on the criteria defined in the rules. The criteria can be program name, protocol, port, or IP address. In a domain environment, administrator can centrally […]

Block-USB-or-Removable-Devices-using-Group-Policy-2.png

Block USB or Removable Devices using Group Policy

There are reasons why USB or removable device usage typically banned in an organization. The common reason is for sanity, as we know that these devices can be the media of virus and malware to spread. There is also security reason, as sometimes people can put confidential data in these devices, which could easily be […]

SysPrep-Tool.png

Generate New SID in Server 2012

Many of today’s Enterprise datacenters are running some form of virtualization. Server virtualization allows us to clone VMs. When it comes to Server 2012, the cloned VM with Server 2012 has duplicate copy of SID of machine from which it was cloned. The duplicate SID value causes lot of issues so each machine must have […]