Expert Tech Insights: Unleashing the Power of Windows, Microsoft 365, and Microsoft Azure

  • Storage Backup & Storage

    Top 5 Features to Look for in On-Premises Veeam Storage

    In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

    Feb 20, 2024 Michael Otey profile picture Michael Otey
  • Datacenter networking servers Active Directory

    What is Active Directory: The Ultimate Guide

    Active Directory is Microsoft’s on-premises identity and access management (IAM) service. In this article, learn how Active Directory (AD) makes it easier for IT to manage an organization’s IT resources. Active Directory is especially useful for companies that have to manage lots of endpoints and servers. What is Active Directory and why is it used?…

    Last Update: Feb 20, 2024

    Jan 6, 2022 Michael Reinders profile picture Michael Reinders
  • Datacenter networking servers Windows

    NTFS Permissions: A Comprehensive Guide

    Windows allows users to assign permissions to files and folders, for added security and to control which users can perform specific actions on files and folders. Learn all you need to know about basic permissions, folder permissions, user permissions, explicit permissions, and much more. What are NTFS permissions? NTFS permissions, first introduced with Microsoft Windows…

    Last Update: Feb 19, 2024

    Dec 18, 2023 Michael Reinders profile picture Michael Reinders
  • Windows Windows 10 Windows 11 Windows Client OS

    How to Use the Icacls Command to Manage File Permissions

    Icacls is a Windows command-line utility that IT admins can use to change access control lists on files and folders. One of the most common tasks that an IT Pro or system administrator performs is modifying permission on a file server. Using the icacls command is a very efficient way to do that, and we’ll…

    Last Update: Feb 19, 2024

    Jul 20, 2022 Michael Reinders profile picture Michael Reinders
  • Datacenter networking servers Windows Server

    What Is an Access Control List (ACL)?

    An access control list (ACL) is a fundamental component of computer security. ACLs help to control and manage access permissions to organizational resources. In this article, I will explain in detail what an access control list is and how you can use them to secure access to local and networked resources. ACLs are an integral part…

    Feb 19, 2024 Sukesh Mudrakola profile picture Sukesh Mudrakola
  • hero approved survey Active Directory

    Petri.com’s New Active Directory Outage and Disaster Recovery Survey

    Petri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,…

    Last Update: Feb 16, 2024

    Feb 15, 2024 Russell Smith profile picture Russell Smith
See All IT Knowledgebase Articles

Thank you to our petri.com site sponsors

Our sponsor help us keep our knowledge base free.

Petri Experts Spotlight

SPONSORS

Sponsored Articles List

  • Storage Backup & Storage

    Top 5 Features to Look for in On-Premises Veeam Storage

    In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

    Feb 20, 2024 Michael Otey profile picture Michael Otey
  • Active Directory

    Petri.com’s New Active Directory Outage and Disaster Recovery Survey

    Petri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,…

    Last Update: Feb 16, 2024

    Feb 15, 2024 Russell Smith profile picture Russell Smith
  • Active Directory

    How to Minimize Your Active Directory Attack Surface

    When newly installed, Active Directory’s (AD) default configuration is designed to be easy to use. As a result, attackers can exploit AD to take over your entire network with relative ease. Here’s what you can do to further protect your organization by reducing your Active Directory attack surface. Securing beyond the default settings to reduce…

    Last Update: Feb 16, 2024

    Feb 1, 2024 Michael Reinders profile picture Michael Reinders
  • Active Directory

    5 Reasons to Consolidate Active Directory Domains and Forests

    A Windows Server Active Directory (AD) forest is the topmost logical container in an AD configuration. In this article, Michael Otey explains the role forests play in an AD configuration and why it is necessary to consolidate Active Directory forests and domains to improve security and management. Every Active Directory deployment contains at least one forest, the parent container in…

    Last Update: Feb 15, 2024

    Feb 14, 2024 Michael Otey profile picture Michael Otey
  • Active Directory

    Top 10 Events to Audit in Active Directory to Uncover Security Risks

    Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

    Last Update: Feb 15, 2024

    Jan 30, 2024 Michael Reinders profile picture Michael Reinders

Tech Smarter. Join Petri Insider.

Create a free account today to participate in forum conversations, comment on posts and more.

Jeff Hicks

“Because knowing PowerShell is harder than crochet with your grandmother and damn critical to your career.”

Jeff Hicks

PowerShell Guru & Petri Contributor

GET IT Learning Center

Visit our Learning Center

OUR SPONSORS