Azure Role-Based Access Control (RBAC) is Microsoft Azure’s primary authorization system for managing access to cloud resources. By assigning specific permissions to users, service principals, and managed identities, Azure RBAC ensures that access is both controlled and aligned with the principle of least privilege. Whether you’re securing a single subscription or governing a hybrid cloud…
Feb 7, 2025Group Policy WMI Filtering is a powerful feature that allows administrators to apply Group Policy Objects (GPOs) and Group Policy preferences based on specific attributes of target computers, servers, and users. By leveraging Windows Management Instrumentation (WMI) queries, IT professionals can create highly targeted and dynamic GPOs that respond to the unique needs of their…
Feb 5, 2025SQL Server Reporting Services (SSRS) is a set of on-premises tools and services that enable you to create, deploy, and manage printed, web, email and mobile reports from SQL Server databases. Let’s look at its evolution and capabilities in more detail. When SQL Server was first released it was a simple relational database but as…
Feb 3, 2025Microsoft announced today new business editions of its Surface Pro 11 and Surface Laptop 7 Copilot+ PCs with Intel x86 Core Ultra processors (Series 2). Additionally, a 5G-enabled variant of the Surface Laptop for Business is set to launch later this year. In September 2023, Microsoft introduced business editions of the Surface Pro 11 and…
Jan 30, 2025This guide will show you how to use the Azure Pricing Calculator effectively, offering step-by-step instructions, real-world examples, and key insights on leveraging its advanced features. By the end, you’ll not only understand your potential costs but also feel confident sharing polished estimates with stakeholders. When managing IT infrastructure, staying ahead of your budget can…
Jan 29, 2025At its core, Microsoft Intune is a Mobile Device Management (MDM) and Mobile Application Management (MAM) solution. It enables organizations to manage both corporate-owned and personal devices (Bring Your Own Device, or BYOD) in a way that balances security requirements with employee productivity. Intune integrates deeply with the Microsoft ecosystem, including Microsoft Entra ID (formerly…
Jan 27, 2025Windows 10 doesn’t reliably give you easy access to stop codes when it crashes. Plus, these codes may flash on your screen for just half a second! In this guide, we’ll show you how to find Windows 10 stop codes, find the reasons behind Windows 10 crashes, and guide you to solidify your Windows reliability…
Last Update: Jul 04, 2024
Feb 6, 2023RAID 0 and RAID 1 are two of the standard RAID storage levels that you can use to create large data stores by combining multiple disk drives. In this article, we’ll explain the main differences between RAID 0 and RAID 1 and help you determine how to choose the best RAID level for your projects….
Last Update: Jul 04, 2024
Dec 27, 2022In this guide, we’ll show you how to install Active Directory Users and Computers (ADUC) and the basics of working with it so you can manage Active Directory. Active Directory Users and Computers (ADUC) is built as an add-on for the Microsoft Management Console (MMC), and it’s the go-to tool for IT Pros to manage…
Last Update: Dec 18, 2024
Aug 12, 2022Windows PCs may sometimes encounter issues during startup, and that can happen when Windows fails to load properly. In this post, we’ll explain how you can use Windows Boot Manager to troubleshoot boot errors and get your PC up and running again. What is Windows Boot Manager? Windows Boot Manager (Bootmgr.exe) is Microsoft’s proprietary Unified Extensible Firmware…
Last Update: Mar 13, 2024
Jun 29, 2022In this article, we will review PowerShell For loops, While loops, Do-While loops, and Do-Until loops. I’ll explain how PowerShell loops are constructed and how to define conditions to enter or exit a loop. PowerShell For loop The For loop is а counting loop, and it’s mostly used when you need to repeat a task…
Last Update: Mar 13, 2024
May 23, 2022Whether you’re a PowerShell pro or just starting out, it’s useful to know how to check your PowerShell version. We’ll explain how to do that in this guide. How to check your PowerShell version Let’s quickly check the version of PowerShell installed on your device: For more details on the different ways to check the…
Last Update: Jul 03, 2024
May 4, 2022Multi-Factor Authentication (MFA) has become important for user security within Active Directory environments. By implementing additional verification steps, MFA makes it more difficult for adversaries to gain unauthorized access and it is essential for any organization aiming to secure its Active Directory infrastructure. However, despite investing heavily on MFA to stop cyberattacks, top research reports…
Nov 25, 2024You are woken by a call at 7am to find out your Active Directory (AD) infrastructure has been hit by ransomware. The helpdesk is overwhelmed by calls from users who can’t log in and management is already demanding to know how long it will take to restore. You break into a cold sweat realizing IT…
Oct 21, 2024In this guide, you will learn about Outlook OST and PST files, why you might need to convert OST files to a PST, and how to convert OST files to PST format. What is an OST file? An OST file, or Offline Storage Table file, is a data file that is created by Microsoft Outlook…
Last Update: Sep 20, 2024
Aug 1, 2024Sometimes, situations arise when an Exchange Server administrator needs to mount an Exchange database on a different server. Here are a few examples: Now, let’s look at how to mount an Exchange database on a different server. Process for mounting an Exchange database on a different server Start by making sure that the integrity of…
Sep 4, 2024Petri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,…
Last Update: Aug 26, 2024
Feb 15, 2024This Week in IT, Microsoft shuts down its Defender VPN service, hackers are targeting ADFS, and the last Cumulative Update (CU) for Microsoft Exchange Server 2019 gets delayed for extended testing. Links and resources Episode overview This week’s IT news highlights Microsoft’s shutdown of its Defender VPN service, hacker attacks on ADFS, and delays in…
Listen now LISTEN & SUBSCRIBE ON:This Week in IT, Surface Copilot+ PCs go all in with Intel, Microsoft announces DeepSeek support is coming to Windows, and the WSUS driver sync service is being retired. Links and resources Episode overview This Week in IT covers various updates from Microsoft, including new AI support, device releases, and service changes.
Listen now LISTEN & SUBSCRIBE ON: