How-Tos

Identity access management  >  abstract network connections and circuits reflected in eye

youtube thumbnails template
video

R tip: How to use Git and GitHub with R projects

See how to use Git version control and sync with GitHub -- all right within RStudio

nwht 033 groups
video

How to use the groups command: 2-Minute Linux Tips

Learn how to use the groups command. It provides a list of the groups that a user is a member of by pulling information from the /etc/group and /etc/passwd files.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

cssg 021 thumb
video

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

cssg 020 thumbpng
video

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you...

Targeting user behavior.

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior.

ifcr 031 thumb
video

How to make your own ggplot2 functions

See how easy it is to make your own functions using ggplot2, dplyr, and other tidyverse package functions – without worrying about quoted and unquoted column names! Thanks to the latest version of the rlang package, tidy evaluation is...

cssg 019 thumb
video

How to set up Azure AD to spot risky users

You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.

ifcr 030 thumb
video

How to use .SD in the data.table package

See how to use the special .SD symbol in the R data.table package.

microsoft windows bitlocker encryption desktop pc monitors

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help.

cssg 018 thumb
video

How to manage Microsoft Windows BitLocker

Use these techniques to inventory your network to determine which devices have BitLocker.

nwht 032 thumb
video

How to use the setfactl and getfactl commands: 2-Minute Linux Tips

In this Linux tip, learn how to use the setfacl and getfacl commands. They allow you to establish and report on file permissions that reach beyond the traditional read, write and execute permissions on Linux systems.

nwht 030 thumb
video

How to use the rev command: 2-Minute Linux Tips

In this Linux tip, learn the command that reverses text – the rev (reverse) command. At first glance, this command may not seem helpful. But, there are times that it can be quite useful.

cssg 017 thumb
video

How to set up Microsoft Cloud App Security

This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.

Microsoft Cloud App Security

How to set up Microsoft Cloud App Security

Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies.

nwht 031 thumb
video

How basic file permissions work: 2-Minute Linux Tips

In this Linux Tip, learn how to read and understand basic file permissions. Once you understand file permissions, you can analyze and reassign them.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

How to tell which Microsoft Office patching process to use

How you download and deploy Microsoft Office patches depends on the version and license type you have. Here's how to determine which process to use.

nwht 029 thumb
video

How to use the awk command: 2-Minute Linux Tips

In this Linux Tip, learn how to use the awk command. You can use it to select one or more pieces of text from lines of input.

Load More