Follow Petri
Last Update: Nov 21, 2022
If you have ever wondered where you can find an object that was deleted from the Archive Directory or if you ever wanted to see the details of your lost objects, this post by Daniel Petri can help you. With these instructions, you will have the ability to recover deleted objects.
Last Update: Oct 31, 2022
In this post we solve the minor but perhaps frustrating issue of having user accounts on the logon screen that are no longer needed or used. Deleting user accounts entirely may sometimes be overkill (what if the account is needed down the road). The better option is to simply remove the user account from the logon screen.
Last Update: Oct 07, 2022
When it comes to downtime, it’s not if but when will it happen to your environment. Everyone knows that outages are an evergreen challenge and if your environment is offline, real dollars are being lost through either a stoppage of sales or an impact to your reputation with your clients.
Last Update: Sep 26, 2022
In this post, Daniel Petri shows how to determine which attributes will be saved for a deleted object. To perform the steps in this article, you must be a member of the Schema Admins group, and have network connectivity with the DC that holds the Schema Master FSMO role.
Organizations have data in many different places that needs to be made available. Whether it is a physical server or a desktop, roaming laptop or a few other configurations – that data needs to be protected against everyday occurrences such as lapses in connectivity, hardware failures, file corruption — or even ransomware or theft.
Today, at an online event, Microsoft is discussing how technology can improve employee engagement and communications; we have embedded the live stream so that you can view the conference.
Aidan Finn and Mike Resseler discuss features and functionality available in Microsoft Nano Server.
Learn how to effectively and efficiently manage access to your organization’s data.
Successful, effective auditing is essential for the compliance and security of your network, but the complexity of Active Directory (AD) can present a roadblock. Find out what you need to ask when evaluating AD monitoring tools.
[Sponsored] With the increasing sophistication of hackers, and the rising black market price of sensitive data IT has a huge target on its back which means a SIEM solutions are critical.