Rick Claus 🦋 @RegularITguy.com

31.8K posts

Rick Claus 🦋 @RegularITguy.com banner
Rick Claus 🦋 @RegularITguy.com

Rick Claus 🦋 @RegularITguy.com

@RegularITguy

A cannuck, a geek, a family man & a self-professed server hugging infrastructure guy who has moved to Azure. I lead a team of awesome worldwide Cloud Advocates.

Redmond, WA 参加日 Nisan 2007
917 フォロー中11.4K フォロワー
Rick Claus 🦋 @RegularITguy.com
Warm Sourdough with a garlic parm inclusion folded in. DAMN! I’ll be over here in the corner munching away…
Rick Claus 🦋 @RegularITguy.com tweet mediaRick Claus 🦋 @RegularITguy.com tweet media
English
2
0
5
152
Rick Claus 🦋 @RegularITguy.com
I was in Las Vegas and SoCal this past week for a spring break D1 Softball trip to watch some of my daughter’s final season. Great games and awesome weather. 🥎 Now back to Washington. 😔
Rick Claus 🦋 @RegularITguy.com tweet mediaRick Claus 🦋 @RegularITguy.com tweet media
English
0
0
4
206
Rick Claus 🦋 @RegularITguy.com
Learn how to Modernize workloads and how (and when) to migrate them. Registration is OPEN. Going live on March 12th (Asia and Europe timezones) as well as April 23rd (Americas). Lots of great resources - sign up for the free event at aka.ms/MigrateandMode…
English
0
0
1
81
Rick Claus 🦋 @RegularITguy.com
Psssst. Dona and I were in studio getting in trouble with our shenanigans while we were helping to put together a "Migrate and Modernize" virtual event. It's got a keynote from Amanda Silver (and friends) as well as two technical sessions (one Infra, one Dev). 1/2
English
2
1
2
462
spencer
spencer@techspence·
For all the people out there using voice dictation on windows for interacting with AI coding platforms/IDs what are you using?
English
9
1
11
3.6K
Rick Claus 🦋 @RegularITguy.com
Rick Claus 🦋 @RegularITguy.com@RegularITguy·
Had a lot of fun and shenanigans with @donasarkar this week. Good discourse on how ops and dev teams are handling the advent of AI. There are striking differences as well as unexpected similarities on approaches. What are your thoughts on her QUESTION below? #itpro #infra #ops
Dona Sarkar@donasarkar

So yesterday @RegularITguy and I got into the arena (office) and had an epic battle (loud conversation) about what each of our communities are dealing with thanks to the gloom-and-doom of “AI will kill off all jobs including your babysitter” For IT folks, they know they need to migrate their estateswhile staying secure and ofc zero downtime. Oh they also need to “do AI”. For dev/builder folks, they know they need to modernize their apps to the latest version of whatever …with zero downtime ofc and they BETTER BE “doing AI”. And in the middle of this chaos, vibe coded apps off twitter are apparently taking our jobs 🧐 QUESTION: For all of you out there, what are they main AI Adoption blockers you all are seeing in your biz? Rick and I have a scheme debuting soon 👀

English
0
0
1
412
Rick Claus 🦋 @RegularITguy.com
On campus yesterday creating some content between meetings. One was a scrappy chat with a Windows Server feature PM, the other was a funded project with an engineering lead. Both of these will be awesome, why? genuine "human to human" storytelling. Capture those stories & share.
Rick Claus 🦋 @RegularITguy.com tweet media
English
0
2
7
357
Rick Claus 🦋 @RegularITguy.com がリツイート
Philip Elder
Philip Elder@MPECSInc·
ACTIVE DIRECTORY HISTORY AND VISION FOR TODAY/TOMORROW Out of the box a Greenfield Windows Server Active Directory has the following Group Policy Objects (GPOs): Default Domain Policy Default Domain Controllers Policy It's like looking at a yuge pile of LEGO bricks, or Technic, with the vision in mind of what they look like in a finished state. In the year 2000, planners and implementers built based on what they had with their Windows Server NT configuration. One big flat ADDS Forest/Domain. After all, who would have thought one's AD could be completely hosed by a perp eh Maersk? ;-) It took time to understand how to architect a properly functioning AD/OU/GPO structure especially since getting to the Group Policy Management Console in Windows Server 2000 was a PITA. By Windows Server 2003 almost all of the flat AD/OU/GPO basic structures were in place. Folks like .@MMinasi and .@JeremyMoskowitz were working hard to train peeps up on the what/where/when/how of Active Directory. Dr. Minasi and Jeremy were the primary sources for me to learn Active Directory, Group Policy, and OU structuring. ARCHITECTING FOR TODAY & TOMORROW Today's threatscape has changed how one should look at the pile of LEGO bricks but also one's current legacy flat AD Forest/Domain setup. How we would architect, or re-architect an existing, Active Directory Forest/Domain structure with each representing a unique Forest/Domain: 1: UserVille: Is a hostile tenant treat it as such ** Exchange Server and SQL Server locked down via GPO/Windows Firewall ** Software Restriction Policies are key here ** AppLocker 2: IT: Privileged Access Workstations ** Jump Servers in each Forest/Domain ** Strict routing and access for each ** DUO or other 2FA mandatory 3: DEV: Another hostile tenant environment 4: DMZ: Windows Server IIS works well with AD ** One can leave the *NIX & *BSD off the DMZ AD 5: Infrastructure: Our physical servers ** Cluster Node and Standalone Hyper-V ** Backup Servers ** Routing absolutely clocked down via GPO/Windows Firewall and pRouter(s) For a Greenfield we have the PowerShell to set up a 10, 100, 1000, 10000, or larger Enterprise quite quickly which is important to understand given the last 15 years worth of Cloud First/Cloud Native peer-to-peer networks out there. I can't imagine having to manage a large 1,000+ peer-to-peer network without Active Directory and Group Policy. I remember those days and they were horror shows! It may seem daunting to pull it all back on-premises, but with the right tools it's actually not that painful. * PowerShell for setup ** User AD Objects ** OU Structure ** Group Policy Objects ** User Exchange Server Mailboxes ** Security Groups and Membership ** Base shares set up with the proper permissions The AD benefits are yuge for Greenfield but also for those needing to re-architect for today's threats as that would essentially be Greenfield too: * Architected Secure by default * Layers with out the complicated "AD Tiers" * Users run in Standard Mode * Users are managed via AD and GPOs * Software Restriction Policies lock UserVille down * No risk of token theft breaking the org open that then leads the perps to all others * DUO or other 2FA/MFA * The data gets backed up and test restored regularly * No snoops * No legalese Terms & Conditions hiding the snoops * Real people behind the IT to help when things don't work Once one has a fairly good understanding of what Active Directory and Group Policy are capable of the public cloud "imitations" barely compare. AZURE AD/ENTRA ID FAILURE After all of these years, since BPOS in 2008, Azure Active Directory/Entra ID have failed dismally to come anywhere near the features and abilities of Active Directory created by Microsoft in the late 1990s and deployed in the year 2,000. In an Enterprise setting with the right Microsoft tools one can deploy and manage 1 to 10,000 users and/or computers with little to no fanfare. And, that ability gets an instant response. No mystery waiting. CONCLUSION IMNSHO, a company's full IT should never have been moved into the Public Cloud. A portion maybe for those companies that are seasonal but not the main IT. By doing so, companies have lost control over all aspects of their IT that count. And, with the Shared Responsibility Model for public cloud resident services the onus is still on the companies to back their data up. A company's main IT belongs on-premises. All of it. ACRONYMS 2FA = Two-Factor Authentiction AD = Active Directory ADDS = Active Directory Domain Services GP = Group Policy GPO = Group Policy Object MFA = Multi-Factor Authentication OU = Organizational Unit pRouter = Physical Router
El Capitan 🔴🥦@donfazool

@MPECSInc Why the is it so horrible misconfigured out of the box? Still holding legacy compatibility back to 2003. The best thing we did was move everything into Azure and kill off the on prem DCs. So much less headaches to worry about for our small teams.

English
4
5
40
4.5K
Jen Gentleman 🌺
Jen Gentleman 🌺@JenMsft·
Number of USBs I own: Countless Number of USBs I can find when I need one: 0
English
16
2
80
3.3K
Rick Claus 🦋 @RegularITguy.com
New year - new training targets. MSFT launched AI Skills Navigator. Think of it as your "coach" for creating a plan to achieve new certifications and skills in the Microsoft ecosystem. My team has been asked to help for the IT Pro / Infra content. Any requests?
Rick Claus 🦋 @RegularITguy.com tweet media
English
1
2
3
284