Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Invoking Device Trust with Intune as MDM

    What is Device Trust? Imagine you are a parent working from home and your child accidentally spills a drink on your work laptop. You have urgent work to be submitted so you choose to complete the same on your home ...

    Read More
  • Does LDAP work with Entra ID? Yes and No

    To make a long story short: Microsoft offers the ability to sync Azure AD (Microsoft Entra ID) with an LDAP server, which can suffice as a short-term solution. This means your Azure AD would be duplicated to an on-prem LDAP ...

    Read More
  • Microsoft Intune Enterprise Wi-Fi Profile Best Practices

    Microsoft Endpoint Manager (Intune) is a stellar MDM that we frequently encounter in managing managed devices, especially when the enterprise size is large, and we need to have centralized control over all the systems within the organization. Intune works really ...

    Read More
  • SCEP( Simple Certificate Enrollment Protocol): A Complete Guide

    Table of Contents What is SCEP? Components of SCEP Gateway SCEP Gateway API URL SCEP Shared Secret SCEP Certificate Request SCEP Signing Certificate SCEP Device Enrollment Process How to Configure SCEP Building the SCEP Gateway Configuring SCEP in Your MDM ...

    Read More
  • AD CS Certificate Templates: Security Best Practices

    Microsoft AD CS allows administrators to establish their domain’s CA to deploy a digital certificate with Microsoft PKI Infrastructure. To properly run their PKI infrastructure and after establishing their hierarchy, administrators will look to assign AD CS certificates to specific groups ...

    Read More
  • A Complete Guide To Wireless (Wi-Fi) Security

    In the modern world, it seems as though it would be nearly impossible to function without access to the wireless internet. People everywhere rely on Wi-Fi for everything from entertainment to achieving their goals. But with the ubiquity of the ...

    Read More
  • How To Configure 802.1X for Ubiquiti UniFi:

    In an era where network infrastructures must run smoothly, protecting sensitive data and securing connections is crucial. Ubiquiti UniFi is a market leader in networking solutions, providing a dependable and scalable platform recognized for its strength and durability. Ubiquiti Networks ...

    Read More
  • A High-Level Overview of Windows 802.1x Authentication

    802.1X is a network security protocol that enhances the security of a network by requiring authentication before granting access, preventing unauthorized network access. In Windows environments, 802.1X is widely employed to ensure the security of both wired and wireless connections. ...

    Read More
  • How to Resolve NPS Reason Code 22

    Remote Authentication Dial-in User Service (RADIUS) is integral to network infrastructure, especially for authentication, authorization, and accounting (AAA) purposes. NPS (Network Policy Server) is Microsoft’s RADIUS server, replacing its age-old Internet Authentication Service (IAS). Like any other RADIUS, NPS performs ...

    Read More