How To

How to Enable Passwordless Authentication with Azure AD

by Russell Smith

Microsoft announced at its Ignite conference, which ran March 2nd – 4th 2021, that passwordless authentication is now generally available. Microsoft has been pushing passwordless over the past couple of years as a more secure way to provide access than passwords and multifactor authentication. Now that passwordless authentication is generally available, organizations can roll out… Read More

How to Enable PowerShell Remoting in Windows 10

by Russell Smith

Unlike Windows Server, PowerShell Remoting isn't enabled by default in Windows 10. PowerShell Remoting is a secure management protocol (WSMan) for connecting to and managing remote devices. In its default configuration, PowerShell Remoting secures traffic over HTTP. It's primarily designed to be used in an Active Directory (AD) environment, which protects the authentication phase using… Read More

Missing Audit Records for Retention Labels Applied to SharePoint Online Documents

by Tony Redmond

Activity Explorer Highlights Label Activities In June 2020, I covered Microsoft’s “Know Your Data” initiative, essentially the introduction of a bunch of new features in the Data classification section of the Microsoft 365 compliance center. Requiring Office 365 E5 or Microsoft 365 E5 (or E5 compliance) licenses, Microsoft targets this functionality at large enterprises who… Read More

How to Configure PowerShell SSH Remoting in Windows 10

by Russell Smith

Microsoft introduced Secure Shell (SSH) as a transport for PowerShell Remoting in PowerShell 6. Older versions of PowerShell (Windows PowerShell) are restricted to HTTP/HTTPS and Windows Remote Management (WinRM). WinRM/HTTP is fine for Active Directory (AD) environments. Authentication and communications are secured. WinRM/HTTPS is for accessing workgroup computers, i.e. computers not joined to an AD… Read More

How to Inventory Remote Computers Using PowerShell

by Russell Smith

Windows Management Instrumentation (WMI) is a management infrastructure built-in to Windows for querying management and operations data. It can be used to query local and remote computers for information like running processes, installed software, BIOS information, and much more. WMI vs CIM WMI is based on the Common Information Model (CIM), which is an open-source… Read More