Last Update: Oct 10, 2024
Last Update: Oct 09, 2024
A simple (non-complex) Active Directory password (AD) is vulnerable to hacking and exploitation. Requiring complex passwords in your Active Directory password policy increases the effectiveness of passwords exponentially – each additional special character you require in your users’ passwords makes them ultimately impervious to brute-force attacks. Going back to the 2000s, Excel’s simple workbook-protected passwords…
Oct 9, 2024 Michael ReindersToday I would like to dig a bit deeper into guest virtual machine (VM) storage virtualization on Azure Stack HCI. My case and scenario today will be around virtual iSCSI servers as a target for other workloads like SQL Server. My cluster consists of three Azure Stack HCI 23H2 nodes cabled in a switched configuration….
Last Update: Oct 09, 2024
Oct 7, 2024 Flo FoxAre you responsible for managing Active Directory (AD) within your organization? Whether you’re an IT professional, security specialist, or part of an infrastructure team, understanding AD resiliency and best practices is crucial. Active Directory is still the most widely used Identity and Access Management (IAM) solution on the market. And for the first time in…
Oct 7, 2024 Russell SmithWhen planning for an Azure Stack HCI environment, many organizations may struggle to decide if they should go for a large Azure Stack HCI cluster or plan for smaller, use-case-specific clusters. Today, I would like to detail the ups and downs of both solutions. To do that, I’ll be discussing the required initial investments, maintenance…
Last Update: Oct 07, 2024
May 8, 2023 Flo FoxIn this article you’ll learn how to install SQL Server Reporting Services 2022 (SSRS) and configure it. It’s important to realize that you must have a previously installed instance of SQL Server running in order to install and use SSRS. Introduction to Microsoft SQL Server Reporting Services Microsoft SQL Server Reporting Services, along with SQL…
Last Update: Sep 30, 2024
Jul 17, 2024 Michael OteyThis article will offer you a straightforward way to list Active Directory users with Active Directory Users and Computers (ADUC). I’ll show you how to do that using the graphical user interface (GUI) with the ADUC tool. Check out how to list Active Directory Users with PowerShell on Petri if you would prefer to perform…
Last Update: Sep 30, 2024
Nov 7, 2022 Michael ReindersOur sponsor help us keep our knowledge base free.
Windows 10 doesn’t reliably give you easy access to stop codes when it crashes. Plus, these codes may flash on your screen for just half a second! In this guide, we’ll show you how to find Windows 10 stop codes, find the reasons behind Windows 10 crashes, and guide you to solidify your Windows reliability…
Last Update: Jul 04, 2024
Feb 6, 2023 Michael ReindersRAID 0 and RAID 1 are two of the standard RAID storage levels that you can use to create large data stores by combining multiple disk drives. In this article, we’ll explain the main differences between RAID 0 and RAID 1 and help you determine how to choose the best RAID level for your projects….
Last Update: Jul 04, 2024
Dec 27, 2022 Michael ReindersActive Directory is an essential part of Windows Server. It allows IT pros to manage computer resources on the network. In this guide, we’ll show you how to install Active Directory Users and Computers and the basics of working with it so you can manage Active Directory. Active Directory Users and Computers (ADUC) is built…
Last Update: Jun 15, 2023
Aug 12, 2022 Michael ReindersWindows PCs may sometimes encounter issues during startup, and that can happen when Windows fails to load properly. In this post, we’ll explain how you can use Windows Boot Manager to troubleshoot boot errors and get your PC up and running again. What is Windows Boot Manager? Windows Boot Manager (Bootmgr.exe) is Microsoft’s proprietary Unified Extensible Firmware…
Last Update: Mar 13, 2024
Jun 29, 2022 Sukesh MudrakolaIn this article, we will review PowerShell For loops, While loops, Do-While loops, and Do-Until loops. I’ll explain how PowerShell loops are constructed and how to define conditions to enter or exit a loop. PowerShell For loop The For loop is а counting loop, and it’s mostly used when you need to repeat a task…
Last Update: Mar 13, 2024
May 23, 2022 Ivan MirchevWhether you’re a PowerShell pro or just starting out, it’s useful to know how to check your PowerShell version. We’ll explain how to do that in this guide. How to check your PowerShell version Let’s quickly check the version of PowerShell installed on your device: For more details on the different ways to check the…
Last Update: Jul 03, 2024
May 4, 2022 Michael ReindersIn this guide, you will learn about Outlook OST and PST files, why you might need to convert OST files to a PST, and how to convert OST files to PST format. What is an OST file? An OST file, or Offline Storage Table file, is a data file that is created by Microsoft Outlook…
Last Update: Sep 20, 2024
Aug 1, 2024 Bharat BhushanIn this blog post, you’ll be introduced to Silver SAML, a variant of Golden SAML. Golden SAML is a sophisticated attack technique used by hackers to bypass MFA (multifactor authentication) and gain access to sensitive data. Silver SAML operates similarly, but targets Microsoft Entra ID rather than on-premises Active Directory. Thanks to Semperis for sponsoring…
Last Update: Sep 04, 2024
Jul 2, 2024 Michael ReindersMaking sure your business is in compliance with the various regulatory policies that you need to work with can be challenging. Many companies use Microsoft 365 to work with unstructured personal data that are covered by laws that require your organization to follow different compliance procedures. This includes responding to regulatory requirements, assessing compliance risks,…
Last Update: Sep 04, 2024
Jan 25, 2022 Michael OteyThe Hybrid Identity Protection (HIP) Conference is the premier educational forum for IT pros tasked with managing identity and securing hybrid cloud environments. As the global health pandemic and move to digitalization change the way enterprises work, the HIP Conference helps IT pros to learn and implement technology that mitigates new business risks. The conference…
Last Update: Sep 04, 2024
Nov 23, 2021 Russell SmithWith the rise in remote workers the risk of ransomware is higher than it has ever been before. By now most people know that ransomware is a type of malware extortion scheme that typically encrypts files and folders preventing access to critical data or sometimes it can also be used to steal sensitive data. After…
Last Update: Sep 04, 2024
Oct 26, 2021 Michael OteyThis Week in IT, Microsoft announces updates to OneDrive, including new AI-powered search, and new features coming for Microsoft 365 Copilot subscribers. Links and resources Episode overview Microsoft announced new features for OneDrive and Microsoft 365 Copilot at its recent event, including AI-powered search, a refreshed mobile app, and updates to the OneDrive desktop experience.
Listen now LISTEN & SUBSCRIBE ON:This Week in IT, Microsoft finally releases the Windows 11 2024 Update, the first version of the OS to include major architectural changes for two years. Plus, there’s a slew of announcements for Copilot+ PCs. Links and resources Episode overview The latest episode of “This Week in IT” covers the release of the Windows 11…
Listen now LISTEN & SUBSCRIBE ON:Monitor, manage, and secure your IT infrastructure with enterprise-grade solutions built from the ground up.
Protecting your business against data breaches has never been easier.