Last Update: Jan 08, 2025
At the device and user level, the Intune Company Portal serves as powerful application that allows end users to install approved apps, securely access resources, and stay compliant with organizations policies. In the modern workplace, ensuring that company-owned devices remain secure and compliant is essential. Without proper oversight, these endpoints can quickly become a conduit for security…
Jan 13, 2025 Dean EllerbyEffective governance is essential in today’s multi-cloud, hybrid IT ecosystems. Azure Policy provides a comprehensive framework for defining, enforcing, and automating compliance across Microsoft Azure resources, on-premises workloads, and third-party clouds via Azure Arc. Azure Policy ensures your resources align with business, security, and compliance requirements—without adding operational overhead. By leveraging initiatives, built-in policies, custom…
Jan 10, 2025 Tim WarnerActive Directory groups are essential tools for managing and organizing users, computers, and other resources within a Windows domain. This article will provide an in-depth exploration of Active Directory (AD) groups, including their types, purposes, and best management practices. Whether you’re a seasoned IT professional or just beginning your journey with Active Directory, this guide…
Jan 8, 2025 Michael ReindersMicrosoft Global Secure Access (GSA) offers an integrated, identity-driven approach to securing remote access to applications, file shares and resources, regardless of location, device, or user identity. I didn’t expect we’d see the beginning of the end of traditional VPNs for at least a decade. The ever-present need for on-premises applications, file shares, and resources to…
Jan 6, 2025 Dean EllerbyThis article explores Microsoft Defender for Cloud features, benefits, integration capabilities, and best practices, offering actionable insights for IT professionals managing multicloud environments. Modern cloud environments demand robust security solutions to tackle ever-evolving cyber threats. Microsoft Defender for Cloud answers this call with a unified security platform that protects resources across Microsoft Azure, Amazon Web…
Jan 3, 2025 Tim WarnerWhat are the benefits of a Hybrid Azure AD (Microsoft Entra ID) Join? I hear this question a lot; especially since I’ve published many videos referring to Hybrid Azure AD joins as a bad idea. Synchronizing existing on-premises Active Directory (AD) devices to Entra ID is beneficial, but for new devices, leveraging the security and…
Jan 2, 2025 Dean EllerbyWindows 10 doesn’t reliably give you easy access to stop codes when it crashes. Plus, these codes may flash on your screen for just half a second! In this guide, we’ll show you how to find Windows 10 stop codes, find the reasons behind Windows 10 crashes, and guide you to solidify your Windows reliability…
Last Update: Jul 04, 2024
Feb 6, 2023 Michael ReindersRAID 0 and RAID 1 are two of the standard RAID storage levels that you can use to create large data stores by combining multiple disk drives. In this article, we’ll explain the main differences between RAID 0 and RAID 1 and help you determine how to choose the best RAID level for your projects….
Last Update: Jul 04, 2024
Dec 27, 2022 Michael ReindersIn this guide, we’ll show you how to install Active Directory Users and Computers (ADUC) and the basics of working with it so you can manage Active Directory. Active Directory Users and Computers (ADUC) is built as an add-on for the Microsoft Management Console (MMC), and it’s the go-to tool for IT Pros to manage…
Last Update: Dec 18, 2024
Aug 12, 2022 Michael ReindersWindows PCs may sometimes encounter issues during startup, and that can happen when Windows fails to load properly. In this post, we’ll explain how you can use Windows Boot Manager to troubleshoot boot errors and get your PC up and running again. What is Windows Boot Manager? Windows Boot Manager (Bootmgr.exe) is Microsoft’s proprietary Unified Extensible Firmware…
Last Update: Mar 13, 2024
Jun 29, 2022 Sukesh MudrakolaIn this article, we will review PowerShell For loops, While loops, Do-While loops, and Do-Until loops. I’ll explain how PowerShell loops are constructed and how to define conditions to enter or exit a loop. PowerShell For loop The For loop is а counting loop, and it’s mostly used when you need to repeat a task…
Last Update: Mar 13, 2024
May 23, 2022 Ivan MirchevWhether you’re a PowerShell pro or just starting out, it’s useful to know how to check your PowerShell version. We’ll explain how to do that in this guide. How to check your PowerShell version Let’s quickly check the version of PowerShell installed on your device: For more details on the different ways to check the…
Last Update: Jul 03, 2024
May 4, 2022 Michael ReindersMulti-Factor Authentication (MFA) has become important for user security within Active Directory environments. By implementing additional verification steps, MFA makes it more difficult for adversaries to gain unauthorized access and it is essential for any organization aiming to secure its Active Directory infrastructure. However, despite investing heavily on MFA to stop cyberattacks, top research reports…
Nov 25, 2024 Joshua ParsonsYou are woken by a call at 7am to find out your Active Directory (AD) infrastructure has been hit by ransomware. The helpdesk is overwhelmed by calls from users who can’t log in and management is already demanding to know how long it will take to restore. You break into a cold sweat realizing IT…
Oct 21, 2024 Michael ReindersIn this guide, you will learn about Outlook OST and PST files, why you might need to convert OST files to a PST, and how to convert OST files to PST format. What is an OST file? An OST file, or Offline Storage Table file, is a data file that is created by Microsoft Outlook…
Last Update: Sep 20, 2024
Aug 1, 2024 Bharat BhushanSometimes, situations arise when an Exchange Server administrator needs to mount an Exchange database on a different server. Here are a few examples: Now, let’s look at how to mount an Exchange database on a different server. Process for mounting an Exchange database on a different server Start by making sure that the integrity of…
Sep 4, 2024 Bharat BhushanPetri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,…
Last Update: Aug 26, 2024
Feb 15, 2024 Russell SmithThis Week in IT, Microsoft is set to layoff underperforming employees, website certificates could be set to expire much faster, and Microsoft urges orgs to patch AD domain controllers as a new vulnerability is identified. Episode overview This week’s IT news highlights Microsoft’s plans for layoffs, changes to website certificate expiration, and a new Active…
Listen now LISTEN & SUBSCRIBE ON:This Week in IT, I look at the year in review with stories about new features that came to Microsoft Loop, the beginning of the end for WS Update Services, a new Microsoft app for hybrid teams, how Teams got a Slack-like makeover, and the timeline for phasing out the legacy Outlook client for the…
Listen now LISTEN & SUBSCRIBE ON: