How To

LATEST

PowerShell

How to Use PowerShell For Loop, While Loop, and Other Loops

Last Update: Mar 13, 2024

In this article, we will review PowerShell For loops, While loops, Do-While loops, and Do-Until loops. I’ll explain how PowerShell loops are constructed and how to define conditions to enter or exit a loop. PowerShell For loop The For loop is а counting loop, and it’s mostly used when you need to repeat a task…

View Article
Cloud Computing

String Data Types in SQL Server: VARCHAR vs. CHAR

Last Update: Mar 11, 2024

Your database is made of data; data is defined by data types. Data types are so fundamental yet they’re often overlooked. In this article, Jennifer McCown answers a few of the most common questions on VARCHAR, CHAR and choosing string data types for your database.

View Article
Storage

Create Guest Clusters in Windows Server 2012 Hyper-V

Last Update: Mar 04, 2024

Create a guest cluster using virtual machines with Windows Server 2012 Hyper-V and learn what Microsoft is doing to make guest clustering easier.

View Article
Datacenter networking servers

NTFS Permissions: A Comprehensive Guide

Last Update: Feb 22, 2024

Windows allows users to assign permissions to files and folders, for added security and to control which users can perform specific actions on files and folders. Learn all you need to know about basic permissions, folder permissions, user permissions, explicit permissions, and much more. What are NTFS permissions? NTFS permissions, first introduced with Microsoft Windows…

View Article
Windows

How to Use the Icacls Command to Manage File Permissions

Last Update: Feb 19, 2024

Icacls is a Windows command-line utility that IT admins can use to change access control lists on files and folders. One of the most common tasks that an IT Pro or system administrator performs is modifying permission on a file server. Using the icacls command is a very efficient way to do that, and we’ll…

View Article
Storage

Consolidating Multiple Windows Domains

Last Update: Feb 14, 2024

If you’re considering bringing Windows Server 2008 onto your network, then one of the decisions that you will eventually have to make is how you plan to integrate this new operating system into your network.  In the vast majority of cases, Windows Server 2008 domain controllers are simply added to existing domains, or some of…

View Article
PowerShell

PowerShell Set Environment Variable – A Step-By-Step Guide

Last Update: Jan 30, 2024

Environment variables are essential for accessing command line tools and controlling program execution in operating systems. In Windows, PowerShell provides a convenient way to manage and access environment variables. You can set the environment path, edit existing paths, and handle the user profile on your computer. In this step-by-step guide, we’ll explore what environment variables…

View Article
Cloud Computing

How to Audit LDAP Signing in an Active Directory Domain

Last Update: Jan 30, 2024

Microsoft is planning to make changes to LDAP security settings in Windows Server. In today’s Ask the Admin, I show you how to audit for unsigned LDAP traffic hitting Windows Server Active Directory.

View Article
Security hero image

Active Directory Security – 5 Steps to Secure AD

Last Update: Jan 30, 2024

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article
Azure Cloud Hero

Top Azure Cloud Security Controls to Understand

Last Update: Jan 08, 2024

This short guide will provide a top-level overview of the crucial Azure cloud security controls and best practices to be aware of. The highlighted suggestions will provide you with options worth considering for deployment across your estate to strengthen your security posture and mitigate the evolving number and severity of cloud-based threats and risks that…

View Article
Go to page