Citrix Virtual Apps and Desktops design considerations

Citrix Virtual Apps and Desktops Deployment and Adoption Resource Center

Table of Contents Introduction to Citrix Virtual Apps and Desktops design considerations Having implemented various on-premises Citrix Virtual Apps and Desktops - VAD (former Citrix XenApp and XenDesktop) infrastructures, i decided to write a, rather long, technical article on Citrix architecture and design best practices. This long guide has it all, from Citrix Virtual Apps ... Read more

Microsoft 365 Exchange Online Data Archival Options

Exchange Online migration design considerations

Introduction In today's digital age, effective data archival is crucial for businesses to ensure compliance, data protection, and efficient information management. Microsoft 365 Exchange Online offers a range of data archival options designed to meet diverse organizational needs. In a separate article, I have outlined the out-of-the-box available methods for data protection in Microsoft 365 ... Read more

Microsoft 365 configuration best practices

microsoft365

Setting the ground for Microsoft 365 configuration best practices It is very common for Microsoft 365 customers to request external consultation on how to properly setup a new Microsoft 365 tenant and subscriptions or re-configure their existing subscription(s) according to Microsoft best practices. This article attempts to put together a Microsoft 365 configuration best practices ... Read more

Microsoft 365 external sharing design considerations

Microsoft 365

Introduction The purpose of this article is to present Microsoft 365 external sharing design considerations. When designing your Microsoft 365 tenant, you need to consider a number of factors for allowing or prohibiting access to your Microsoft 365 applications and data to a number of internal and external users. This article discusses the following design ... Read more

Deprecation of basic authentication in Exchange Online

Exchange Online migration design considerations

Introduction Microsoft has removed Basic authentication and the smtp auth option in Exchange Online services, i.e. Exchange Online for Exchange ActiveSync (EAS), POP, IMAP, Remote PowerShell, Exchange Web Services (EWS), Offline Address Book (OAB), Outlook for Windows, and Mac. The Microsoft Security defaults configuration and modern authentication are the successor technologies and use OAuth 2.0 ... Read more

Microsoft 365 pre-migration checklist

Microsoft 365

Introduction When planning to migrate an organization with existing on-premises infrastructure to the Microsoft 365 Cloud, you need to create a thorough plan before the migration. This article discusses a Microsoft 365 pre-migration checklist which is provided as a template by Microsoft. Microsoft 365 pre-migration checklist Carry out the following tasks to prepare for migrating ... Read more

The Stefanos Cloud Podcast

The Stefanos Cloud Podcast

I am happy to announce that the Stefanos Cloud Podcast has been released and will be updated with new content on a weekly basis. The Stefanos Cloud podcast utilizes AI-driven Natural Language Processing (NLP) and ports the existing Hybrid Clouds Blog posts into audible posts. The following topics are covered: The Stefanos Cloud Podcast is ... Read more

Microsoft 365 secure score top 10 improvement actions

security and privacy

Introduction Microsoft 365 security score is a consolidated security score based on Microsoft best practice security configurations for Microsoft 365 tenants. The higher the score the higher theoretically your overall Microsoft 365 tenant security levels. The score comprises a list of improvement actions based on your current security posture. Not all improvement actions may be ... Read more

TLS 1.0 and 1.1 deprecation in Azure services

TLS on Azure services

Overview Some of TLS protocols (TLS 1.0 and TLS 1.1) as well as ciphers suites (3DES -  TLS_RSA_WITH_3DES_EDE_CBC_SHA) are gradually being deprecated from all software systems (client and server). This undoubtably affects Azure services as well. If there is a mismatch in the TLS configuration among the components of your Azure solution, you may encounter ... Read more