Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

remote administration

What is Windows 10 Cloud Configuration

by Russell Smith

February 2nd, 2021, Microsoft announced 'Windows 10 in cloud configuration'. 'Cloud configuration' is a new recommended device configuration that can be applied to Windows 10 computers using Intune, Microsoft's Mobile Device Management (MDM) solution, which is part of Microsoft Endpoint Manager (MEM). Organizations can use MEM to apply a standard configuration to devices running Windows… Read More

How to Configure PowerShell SSH Remoting in Windows 10

by Russell Smith

Microsoft introduced Secure Shell (SSH) as a transport for PowerShell Remoting in PowerShell 6. Older versions of PowerShell (Windows PowerShell) are restricted to HTTP/HTTPS and Windows Remote Management (WinRM). WinRM/HTTP is fine for Active Directory (AD) environments. Authentication and communications are secured. WinRM/HTTPS is for accessing workgroup computers, i.e. computers not joined to an AD… Read More

How to Inventory Remote Computers Using PowerShell

by Russell Smith

Windows Management Instrumentation (WMI) is a management infrastructure built-in to Windows for querying management and operations data. It can be used to query local and remote computers for information like running processes, installed software, BIOS information, and much more. WMI vs CIM WMI is based on the Common Information Model (CIM), which is an open-source… Read More

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: