Tips & Tricks

Secure-LDAP-in-Active-Directory-Encrypt

How to Configure Secure LDAP (LDAPS) in Active Directory with Let's Encrypt

An essential part of hardening an Active Directory environment is configuring Secure LDAP (LDAPS). When LDAPS is enabled, LDAP traffic from domain members and the domain controller is protected from p...

How to Apply Group Policies in Remote Desktop Manager

Some things in life make our life easier, like owning a rumba when you have a messy dog, an IoT fridge that automatically orders groceries when you’re running low, or this awesome wine glass for those...

10 Ways to Increase VPN Security

Here is a question I get a lot: “Do virtual private networks provide effective security for businesses?” The short answer is: Yes! Now, here is the longer answer: VPNs use encryption to create a secur...

10 Reasons to Strengthen Identity Security with Single Sign-On (SSO)

We are living through historic times. I can’t believe that one day we will tell our kids: “I remember when people fought for toilet paper during the COVID-19 pandemic.” Or actually, our kids may be ev...

[NEW] Bitwarden Now Integrated in Remote Desktop Manager Enterprise

The start of a new year means that it’s time to make New Year’s Resolutions — or, if you’re like me, make the same resolutions that you’ve made many times in the past (“eat healthier” has been on my l...

Glossary of Common Privileged Access Management (PAM) Terms

When I started working at Devolutions a long time ago (it’s been five years — time flies when you’re having fun!), I thought my language skills were pretty good. I mean, I’m fluent in English and Fren...

[TUTORIAL] How to Enhance Your IIS Server Security with Client Certificates

Certificates are easily deployed in an Active Directory (AD) infrastructure, but using them to manage access — especially to websites hosted on an Internet Information Services (IIS) server — can be c...

How-to-Choose-MSP

How to Choose the Right Managed Services Provider

Managed services providers (MSPs) help businesses — especially small and mid-sized firms that don’t have millions of dollars to hire in-house IT experts — increase their capacity and skillset, reduce ...

Temporary-Access

Temporary Access Now Available in Remote Desktop Manager 2020.3

We are always looking for ways to help IT professionals and organizations increase security, while at the same time enhance efficiency, productivity, and ease of use. And checking all of these boxes —...

Devolutions Support Frequently Asked Questions

Did you know there are FIVE WAYS to contact our support team? You can: Submit a support ticket by emailing [email protected] You can also submit a support ticket from within Remote Desktop Ma...

How-to-Troubleshoot-Networks-with-Traceroutes

How to Troubleshoot Networks with Traceroutes

When it comes to troubleshooting network problems, there are a variety of tools available, from speed tests to network monitoring software. Each tool has its purpose, and plays an integral part in opt...

advocates-top-tips

Tips + Favorite Integrations from Remote Desktop Manager Advocates

The Avengers are a group of superheroes who fight for freedom and justice. Well, Remote Desktop Manager Advocates have a similar mission, except that instead of fighting the battles that S.H.I.E.L.D. ...

Going-passwordless-Remote-Desktop-Manager-CyberArk

Going Passwordless with Remote Desktop Manager and CyberArk

During the last few months, you may have noticed a heightened level of collaboration between Devolutions and CyberArk. In Remote Desktop Manager (RDM) 2020.2, we refreshed two out of three CyberArk en...

Microsoft-free-certification-exam-blog

Microsoft Offering Free Microsoft Certification Exam Until October 7

Since many of you are always looking to advance your knowledge and enhance your resume, we wanted to share that until October 7, 2020, Microsoft is offering a free certification exam to anyone who com...

Devolutions-Password-Server-Command-Line-Interface

Devolutions Server Command Line Interface Table

A long, long, long time ago, before graphical user interfaces (GUI), there was the humble command line. Or maybe we should call it the hated command line, because so many developers dreaded them (and ...

Tutorial-Installing-OpenSSL

[TUTORIAL] Manually Installing OpenSSL on Windows, Linux & macOS

In a recent tutorial, I explained how to generate secure self-signed server and client certificates with OpenSSL. Today, I thought it would be helpful to focus on manually installing OpenSSL on Window...

How to Update Your Devolutions Password Server Registration Serial After a Renewal

Before looking at how to update a Devolutions Password Server (DPS) registration serial after a renewal, I’d like to start with a little story from my personal life, if you don’t mind. Like a lot of p...

How-to-Optimize-Network-Performance

How to Optimize Network Performance

A poorly performing network can cost your business in more ways than one. Dealing with a slow network means that calls are dropped, files take longer to send, applications take longer to load, and pro...

Why You Should Never Use the Native .Zip Crypto in Windows

When working in IT security, there are some questions that keep coming up, and I thought this one deserved to be answered once and for all: Is there any way to crack a password-protected zip file? I u...

Common-Network-Performance-Issues

The 5 Most Common Network Performance Issues

There are many causes of poor network performance. Some network problems can arise from faulty hardware, such as routers, switches, firewalls, and even from unexpected usage patterns, like network ban...