As our business continues to grow our focus is on providing white labeled Tier 3 IT support services, RMM as a service, and co-managed IT services. This blog will be highlighting tips for using Powershell to get an Active Directory User Count.
Research
You need to find out what the Organizational Unit (OU) path that you are trying to get the count from. The following command will list all OUs in the domain.
Get-ADOrganizationalUnit -Filter 'Name -like "*"' | Format-Table Name, DistinguishedName -A
If you want the entire organization then you will need the top level information which looks like DC=[DomainName],DC=local
Variables
$SearchOU = This is the full DistinguishedName from the above output.
The script will take several seconds to run based on the number of users in the OU being searched. The output is an integer number. You can do the same sort of thing for an Active Directory Group Count or Active Directory Computer Count:
Farmhouse Networking 2023 zero trust audits verify continuous authentication and micro-segmentation for Oregon SMB cybersecurity compliance.
This is the tenth and finale in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on Cyber Security Audit.
Cyber Security Audit
Cyber Security Audit is a process where both internal and external systems are tested for their ability and susceptibility to being successfully attacked by hackers. This usually involves an inventory of current systems, research into known vulnerabilities, and testing of those found to see what information can be accessed. Once this process is complete a report is generated to detail both what is found and how those vulnerabilities can be addressed to protect the business’ most valuable commodity – information (intellectual property and client data). Here are some questions to ask:
Do you have an inventory of all assets in your organization? Is it up to date?
Have you tested your internal network for vulnerabilities?
Have you had a penetration test performed on your external network?
Do you know what compliance standards apply?
How do you document policies and procedures? Who oversees that?
If your company is wanting to have a free cyber security audit, then contact us for assistance.
Farmhouse Networking’s zero trust security model prevents lateral movement
This is the ninth in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on Network Security.
Network Security
Network Security is having the proper hardware and configuration of that hardware in place to protect the business network. This configuration includes segmenting network traffic to keep specific types of traffic, like guest devices, separate from traffic of business devices. It also includes keeping outsiders out of the network and detecting when they have breached security measures. Here are some questions to ask:
Do you have a business class router / firewall?
Do you have business class switches and access points that support segmentation?
Is your network configured to segment business traffic from guest traffic?
Are devices like VoIP phones and network cameras on their own network?
Is geo-location blocking turned on for non-essential countries?
Is network traffic being analyzed for suspicious activity?
Do you filter internet traffic?
Can your network detect and respond to a breach?
If your company is wanting to lock down network security, then contact us for assistance.
This is the eighth in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on Application Whitelisting.
Application Whitelisting
Application Whitelisting is a process of determining which software programs the company absolutely needs to do business, marking them as safe, and blocking any other program that tries to run on company computers. This methodology has the distinct advantage of blocking almost all forms of malware on computers. Pairing this with a good next-gen antivirus creates an impenetrable wall against malware threats. It also prevents users from accidentally or intentionally running something that should not be on company computers. Here are some questions to ask:
Do you know all software on your computers?
Do your users spend time on company computers listening to music?
Have any of your users ever downloaded software without asking?
Do you have a computer use policy? How is that enforced?
If your company is wanting to lock down what is running on company computers, then contact us for assistance.
This is the seventh in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on software patching.
Software Patching
Software patching is a neccesity because no person who writes code is perfect and hackers are actively looking for these mistakes. The hackers find the mistakes and then develop ways of using these to exploit the software, computer, or whatever else they can gain access to. The only way to combat both the mistakes and the exploits is to discover them before the hackers do and patch the hole in the software. This patch can however lead to unforseen consequences to the software, so a plan for testing and deployment of patches is needed to avoid unexpected downtime to businesses.Here are some questions to ask:
Do you know all of the hardware and software on your network?
Do you check for hardware, operating system, and other software regularly?
How do you check for updates, patches, or upgrades to software?
How do you install these patches? Is it automated?
Are these patches tested before installation?
What happens if a patch causes problems?
Do you have a log of all installed updates?
Are any systems or software on your network no longer supported for updates?
If your company is going to use full disk encryption or has compliance requirements that you need consulting for, then contact us for assistance.
This is the sixth in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on endpoint security.
Endpoint Security
Endpoint security is a fancy term used to describe how the computers on the network are protected. This used to be done by antivirus but due to the complexity of the attacks hackers are using to compromise networks these days, the definition has expanded greatly. This now includes things like Enhanced Detection & Response software, Security Operations Centers, DNS Filtering, employee train and more. Here are some questions that you should be asking yourself:
Are your endpoints protected by antivirus or enhanced detection & response?
Is website traffic being monitored? Restricted?
Are your employees being trained in cyber security?
Are computer logs being monitored for malicious activity?
Would unusual or suspicious activity on a computer be noticed? Alerted on?
Do you have security permissions set on all file shares?
Do you have least privileged access configured on those shares?
Do you keep track of what software is installed on all workstations?
Do you block access to unauthorized software?
Are files encrypted on servers and workstations?
Are your mobile devices managed? Can you wipe them remotely?
Are USB ports blocking removeable storage devices?
Are endpoints set to automatically log-out?
If your company is going to use full disk encryption or has compliance requirements that you need consulting for, then contact us for assistance.
Farmhouse Networking secures vendor access with zero trust verification for Grants Pass businesses, protecting against supply chain threats.
This is the second in a series about the concept of Zero Trust, which means in the IT sense that you trust nothing and always verify everything surrounding and connected to your network. Today’s discussion will be on the vendors you purchase network equipment from.
Trusted Vendors
Trusted vendors are those who supply workstations, servers, routers, switches, power protection, software, and anything else connected to your network. Here are some questions that you should be asking yourself:
Do you know who makes your network equipment, servers, computers, and software?
Do you know the way to contact their support and have current account access information?
Do you have current warranties / support contracts on hardware and software?
Is the hardware able to perform at the level needed?
Are you purchasing software from those who meets industry standards?
If a subscription, how much are you paying and are you on the correct plan for your needs?
When is the last time you upgraded your software and hardware?
Have you budgeted for the next upgrade?
Take time to think about these questions and decide where changes can be made to better protect your IT investments, or contact us to do the thinking for you.
83% of employees continue accessing old employer’s accounts
Farmhouse Networking Grants Pass implements robust employee offboarding to revoke access and secure networks for Oregon businesses.
A study was performed by Beyond Identity throughout the US, UK, and Ireland which found that 83% of employees admitted to maintaining continued access to accounts from a previous employer. Also a shocking 56% admitted to using this access to harm their former employer.
The study also states that a professional and details offboarding process can prevent unauthorized access by former employees by eliminating their passwords and other insecure authentication methods. Strangely enough this also creates a sense of goodwill in the company that helps to lessen the motivation for employees to attempt this kind of malicious access. This kind of process is vital considering the current employment market and high turn over rates at almost all companies.
If your company does not have a detailed and documented offboarding process, thencontact usfor assistance.
Security researchers performed penetration testing on the networks of 45 various mid-sized companies and found that in real life scenarios 93% of those networks were able to be compromised to the point of business disruption. Here are the details:
The Target
The 45 companies were polled to determine what would be an unacceptable business interruption. They decided that the following met that criteria:
Disruption of production processes
Disruption of service delivery processes
Compromise of the digital identity of top management
Theft of funds
Theft of sensitive information
Fraud against users
These became the target for the penetration testers.
The Process
In order for the penetration tester to achieve their target, they followed the following process:
Breach the network perimeter – This was done by the use of compromised passwords found on the Dark Web and know vulnerabilities on devices that were directly connected to the internet
Obtain maximum privileges – In 100% of the networks, once an attacker was inside the network
Gaining access to key systems – With maximum privileges, the testers are able to gain access to other areas of the network including databases, executives computers, and production servers
Develop attacks on target systems – Once key systems are compromised the testers then figured out how to create the unacceptable business interruption. Although they could have created these interruptions, they only gathered proof that they could to present the data to the companies.
How to Defend
There are a couple main ways to defend against these kinds of attacks:
Security Controls / Segmentation – Creating least privileged access to key systems and segmenting the network will keep hackers from traversing the network once inside
Enhanced Network Monitoring – Modern cyber security tools watch activity and traffic on the network to find indicators of compromise. They pool this information into an attack history that can be used to remediate and further protect.
Your company is not as safe as you think, so contact us for free initial cybersecurity evaluation and risk report. .
Visualize your Azure migration success with the Microsoft Azure Migration Program (AMP)—structured steps, cost savings, and expert guidance for seamless cloud adoption.
If you are considering moving servers, line‑of‑business apps, or databases into Microsoft Azure, the Azure Migration Program (often called AMP) is designed to reduce risk, speed up the project, and lower your total cost of migration. For a business owner, AMP means structured guidance from Microsoft and certified partners, funded assessments, and proven tools instead of “figure it out as we go.”
What Is the Azure Migration Program (AMP)?
Microsoft’s Azure Migration Program provides a guided, end‑to‑end approach to moving workloads into Azure, based on the Cloud Adoption Framework. It combines technical guidance, training, migration tools, and cost‑saving offers so your team is not reinventing the wheel.
Key elements include:
Curated, step‑by‑step guidance from Microsoft experts and specialized migration partners.
Free Azure migration tools such as Azure Migrate, Azure Site Recovery, and Database Migration Service.
Cost‑reduction offers like Azure Hybrid Benefit and extended security updates for legacy Windows Server and SQL Server.
Training and skill building for your IT staff so they can operate confidently in Azure after the move.
Practical Action Steps for You and Your IT Team
As the owner, your role is to set business priorities and ensure the migration stays aligned with revenue, risk, and customer impact, while IT handles the technical execution.
Step 1: Define business outcomes and constraints
Identify which systems are most critical (ERP, EMR, accounting, CRM) and what can tolerate downtime.
Set financial guardrails: target monthly cloud budget and acceptable payback period on the migration.
Step 2: Assess your current environment Your IT team, often with an AMP‑qualified partner, should:
Inventory servers, applications, databases, and dependencies (who talks to what, and when).
Use Azure Migrate to scan workloads and estimate right‑sized Azure resources and costs.
Group applications into logical waves (low‑risk first, mission‑critical later).
Decide per workload: rehost (“lift and shift”), refactor, or modernize.
Agree on success metrics: performance, availability, RPO/RTO, and cost per workload.
Step 4: Secure funding and enroll in AMP
Confirm AMP eligibility and available funding for assessments and implementation with a certified partner.
Use funded assessments to validate architecture, security, and migration approach before committing to a full rollout.
Step 5: Execute, optimize, then expand
Start with a pilot migration to prove performance, security, and cost assumptions.
Monitor usage with Azure Cost Management and tune sizing, auto‑scaling, and reserved instances.
Apply lessons from the pilot to subsequent waves to reduce timelines and surprises.
Common Client Questions (and Clear Answers)
Q1: Is Azure really more cost‑effective than keeping my servers on‑premises? A: For most organizations, especially those facing hardware refresh, licensing renewals, or colo costs, Azure can be more cost‑effective when workloads are right‑sized and governed. AMP helps you estimate costs with real data and use cost‑optimization tools like Azure Hybrid Benefit and Azure Cost Management from day one.
Q2: How will this impact uptime and my customers? A: The program is designed to minimize disruption using tools such as Azure Site Recovery and structured migration waves. With proper planning, most critical workload cutovers are scheduled during low‑usage windows and can be rolled back if required.
Q3: What about security and compliance? A: Azure includes built‑in security controls, encryption, identity management, and compliance certifications that often exceed what small and mid‑sized businesses maintain on‑premises. AMP engagements incorporate security and governance reviews so your new environment aligns with industry and regulatory requirements.
Q4: My internal IT team is stretched. Do they have to do everything? A: No—AMP is explicitly structured around collaboration between your team, Microsoft engineers, and certified partners. Your staff focuses on business knowledge and application nuances while the partner handles the heavy lifting and trains your team on new cloud operations.
Q5: We tried “cloud” before and it was painful. Why will this be different? A: Most failed migrations lacked a standardized framework, proper assessment, or cost governance. AMP enforces a proven methodology, tooling, and checkpoints, reducing the likelihood of budget overruns, downtime, or security gaps.
How Farmhouse Networking Helps You Succeed with AMP
Farmhouse Networking aligns your Azure migration with your business strategy, not just your server list. We help you translate goals like “reduce downtime,” “improve security posture,” or “support remote work” into a concrete cloud roadmap.
Here is how we typically engage:
Eligibility and strategy session – We review your environment, validate AMP eligibility, and map out a phased migration aligned with risk and cash‑flow tolerance.
AMP‑style assessment and planning – We perform an in‑depth inventory, dependency analysis, and sizing estimate using Azure’s migration tools, then deliver a prioritized migration plan and business‑level impact summary.
Hands‑on migration and modernization – We handle the technical execution: configuring Azure landing zones, security and networking, moving servers and databases, and modernizing apps where it makes financial sense.
Training and ongoing optimization – We coach your IT staff on Azure operations and put cost, security, and performance monitoring in place so you continue to see value after the cutover.
Take the Next Step
If you are ready to explore whether the Azure Migration Program is the right path for your business—and want a partner who understands both the technical and financial side of migration—Farmhouse Networking is ready to help. Email support@farmhousenetworking.com for more information about how Farmhouse Networking can help improve your business with a structured, low‑risk move to Azure.
And God will generously provide all you need. Then you will always have everything you need and plenty left over to share with others. As the Scriptures say,
“They share freely and give generously to the poor. Their good deeds will be remembered forever.”
For God is the one who provides seed for the farmer and then bread to eat. In the same way, he will provide and increase your resources and then produce a great harvest of generosity in you. - 2 Corinthians 9:8-10
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.