Blog

Security hero image

Active Directory Security – 5 Steps to Secure AD

Last Update: Jan 30, 2024

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article

Learn to Work with SharePoint PowerShell Objects and Scripts

Ever want to actually understand one of those SharePoint PowerShell scripts you find on the Internet? This article will help you understand and create those crazy scripts.

View Article
PowerShell

Understanding PowerShell Objects

Last Update: Oct 10, 2022

One of the features that both makes PowerShell so easy to use yet sometimes difficult to learn is its focus on objects. I have taught PowerShell objects to many people over the last 10 years and this is not as difficult as people make it out to be. That is to say, I think many…

View Article
Security

How to Enable Azure AD Password Protection: A Step-by-Step Guide

Last Update: Jul 17, 2023

As an IT admin, preventing your users from using simple or known-hacked passwords has become critical for the overall security of your enterprise. An excellent step to take is to plan for and deploy Azure AD Password Protection. In this article, I’ll walk you through installing the Proxy service and DC agent in your on-premises…

View Article

Surface Duo Review: The Pursuit of Productivity

Microsoft’s Surface Duo is a unique productivity device that fits in your pocket but it is not for everyone.;

View Article
UnplugIT Episode 12

UnplugIT – IT Lessons Learned From The House of Mouse

Last Update: Mar 19, 2024

With over 25 years of experience leading IT for one of the largest organizations in the world, Tim Aberle shares his experiences on what he shares with every IT Pro who comes to him looking to leverage and experience. 🎬 Watch Petri’s GET-IT Microsoft Teams Day conference (On-Demand): 💪 Thanks to this episode’s sponsor: PowerApps911…

View Article

Introduction to Cisco ASA 5500 Series Adaptive Security Appliances

The ASA 5500 series is the successor to Cisco’s PIX range of firewall devices, providing industry standard routing and firewall functionality with a range of models designed for teleworker right up to large datacenter scenarios. In this article Cisco expert Tom Finnis will focus on the 5505 and 5510 models aimed at branch and head office deployments, highlighting key features and capabilities.

View Article
Windows

A Complete Guide to Robocopy

Last Update: Sep 29, 2022

Robocopy is a powerful command-line tool for Windows that allows users to synchronize files and folders from one location to another. Learn more about everything you can do with Robocopy here. What is Robocopy? Robocopy stands for “Robust File Copy.” It is a powerful (and potentially scary) command-line utility to copy or move files from…

View Article

Using the System Preparation Tool (Sysprep) in an Image-Based Installation

Using the System Preparation Tool (Sysprep) in an Image-Based Installation An average Windows XP installation can last for 90 minutes, and even more, considering all the hotfixes, service packs and applications you need to install. This can make OS installations extremely time consuming operation for the IT administrator. One way to save this time is…

View Article

Choosing an Azure Virtual Machine – December 2018

Aidan breaks down what you need to know before choosing an Azure virtual machine.

View Article
Go to page