Last Update: Mar 13, 2024
In this article, we will review PowerShell For loops, While loops, Do-While loops, and Do-Until loops. I’ll explain how PowerShell loops are constructed and how to define conditions to enter or exit a loop. PowerShell For loop The For loop is а counting loop, and it’s mostly used when you need to repeat a task…
Last Update: Mar 11, 2024
Your database is made of data; data is defined by data types. Data types are so fundamental yet they’re often overlooked. In this article, Jennifer McCown answers a few of the most common questions on VARCHAR, CHAR and choosing string data types for your database.
Last Update: Mar 04, 2024
Create a guest cluster using virtual machines with Windows Server 2012 Hyper-V and learn what Microsoft is doing to make guest clustering easier.
Last Update: Feb 22, 2024
Windows allows users to assign permissions to files and folders, for added security and to control which users can perform specific actions on files and folders. Learn all you need to know about basic permissions, folder permissions, user permissions, explicit permissions, and much more. What are NTFS permissions? NTFS permissions, first introduced with Microsoft Windows…
Last Update: Feb 19, 2024
Icacls is a Windows command-line utility that IT admins can use to change access control lists on files and folders. One of the most common tasks that an IT Pro or system administrator performs is modifying permission on a file server. Using the icacls command is a very efficient way to do that, and we’ll…
Last Update: Feb 14, 2024
If you’re considering bringing Windows Server 2008 onto your network, then one of the decisions that you will eventually have to make is how you plan to integrate this new operating system into your network. In the vast majority of cases, Windows Server 2008 domain controllers are simply added to existing domains, or some of…
Last Update: Jan 30, 2024
Environment variables are essential for accessing command line tools and controlling program execution in operating systems. In Windows, PowerShell provides a convenient way to manage and access environment variables. You can set the environment path, edit existing paths, and handle the user profile on your computer. In this step-by-step guide, we’ll explore what environment variables…
Last Update: Jan 30, 2024
Microsoft is planning to make changes to LDAP security settings in Windows Server. In today’s Ask the Admin, I show you how to audit for unsigned LDAP traffic hitting Windows Server Active Directory.
Last Update: Jan 30, 2024
In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…
Last Update: Jan 08, 2024
This short guide will provide a top-level overview of the crucial Azure cloud security controls and best practices to be aware of. The highlighted suggestions will provide you with options worth considering for deployment across your estate to strengthen your security posture and mitigate the evolving number and severity of cloud-based threats and risks that…