In our free, expert-led summit, experts will cover everything from Azure Backup’s features and limitations to the best practices for business continuity across Microsoft’s most essential platforms.
Unfortunately, IT professionals have to deal with sensitive information all the time. That information could be in the form of passwords, proprietary company information or anything that you'd rather ...
Using Windows Management Instrumentation makes it easy to pull information about the drives on your system or remote systems. Here's how. Managing drives is a very common thing that a system ...
There are a few ways that PowerShell can provide some sort of notification method to alert you when something happens such as a script completing or an issue is detected during a query. The most ...
There's one thing to keep in mind: Although the path to the file or folder is, by default, pointing to the folders on the server, the path is relative to the client to whom this Group Policy will be ...
If you want to group parts of your code for debugging purposes or simple readability, the PowerShell ISE has the answer. Keeping your code organized is sometimes just as important as the code actually ...
I wrote about the BitLocker feature in Microsoft Windows Vista almost two years ago, when Vista had just been released. With Vista Service Pack 1 (SP1), Microsoft implemented a few enhancements to the ...
Hackers can use tools like BloodHound to visualize the shortest path to owning your domain. But that doesn't mean you can't use it to find and protect your organization's weak spots. Here's how.
Running Active Directory isn't an easy job. This article briefs you on what kind of work you'll need to be conversant with to get the most from your directory services. 1. One of the most common tasks ...
As any system administrator knows, using a domain account as a service account is a great practice. Of course, making sure that the account is using the lowest level of privileges is just as important ...
For a number of years Microsoft Windows has had a nice feature for recovering from something "bad" using system restore points. These system snapshots can be configured to happen automatically.
PowerShell 3 deploys a new type adapter that will have you seeing hash table output in the order you want them to appear. In PowerShell 2, a common technique for creating a custom object is to create ...