I am attempting to execute the following Powershell command: Enter-PSSession -ComputerName localhost The server in use is running Windows Server 2008 R2 SP1 64-bit. The server is on a domain. I am logged in under my domain administrator account. The powershell session was started as Administrator. I'm getting the following error message from powershell itself: PS C:\Users\Daniel> Enter-PSSession -Computername localhost Enter-PSSession : Connecting to remote server localhost failed with the fo...| Recent Questions - Server Fault
How do I add Header set X-Content-Type-Options to webite that first executes perl scriptHow do I add Header set X-Content-Type-Options to webite that first executes perl scriptHow do I add Header set X-Content-Type-Options to webite that first executes perl scriptHow do I add Header set X-Content-Type-Options to webite that first executes perl script| Recent Questions - Server Fault
Capacity of one 12TB drive slightly larger than standard and documentedCapacity of one 12TB drive slightly larger than standard and documentedCapacity of one 12TB drive slightly larger than standard and documentedCapacity of one 12TB drive slightly larger than standard and documented| Recent Questions - Server Fault
So I'm attempting to write a PowerShell script with a GUI input; idea being that the end users see a nested TreeView of the file system. They tick a some folders, hit a button, ...magic happens. I have the mount points (Not sure what's happening with C yet), problem is i can't seem to figure out / find how to enumerate through and add as nested nodes. My search results all seems to point me to C#, C++, etc examples; not the helpful. Ideas? --- This is what i got This is what i want (but keeps...| Recent Questions - Server Fault
A custom runtime environment is a way of defining a specific job execution environment for Azure Automation runbooks, including Microsoft Graph PowerShell SDK runbooks. In this article, we create a new environment for PowerShell V7.4, load in some SDK modules, switch a runbook from a system-generated environment, and run some code.| Office 365 for IT Pros
The Office 365 for IT Pros eBook team is proud to announce the availability of update 15 for the Automating Microsoft 365 with PowerShell eBook. The book includes extensive coverage of how to work with Microsoft 365 workloads through standard modules, Graph APIs, and the Microsoft Graph PowerShell SDK, including hundreds of practical examples over 350-plus pages. No fluff, just real-world code.| Office 365 for IT Pros
Hello - Here is the new HTMD Blog Article for you. Enjoy reading it. Subscribe to YouTube Channel https://www.youtube.com/c/AnoopCNairSCCM?sub_confirmation=1 and LinkedIn page for latest updates https://www.linkedin.com/company/how-to-manage-devices/ The post How to Export Privileged Identity Management Role Assignments in Entra ID using PowerShell appeared first on HTMD Community Modern Device Management News & Guides by Sujin Nelladath.| HTMD Community Modern Device Management News & Guides
Intune Endpoint Privilege Management got more and more features in the last months (child process behavior, argument support, etc.), converting it from a relatively basic EPM solution to a competitive product. However even with all that improvements, there are still a few things that are not as intuitive as they could be, so I wanted to show you a few tips and tricks from the field, showing you how you can solve some of the more complex scenarios| Mike's MDM Blog
In this installment of the Graph Activity Log series, we uncover how attackers exploit OAuth app consent to silently access Microsoft 365 data. Using targeted KQL queries and PowerShell automation, this blog shows how to detect, investigate, and respond to these stealthy identity-based threats. The post Investigating OAuth App Abuse with the Graph Activity Log appeared first on Practical 365.| Practical 365
On Linux or macOS, encoding and decoding with base64 is simple. But on Windows, there’s no built-in base64 command in CMD or PowerShell. That’s why many users search for fast alternative of the base64 command in Windows. The simplest way to convert Base64 encoded/decoded data is to use PowerShell’s ToBase64String and FromBase64String methods. The one-liners […] The post Base64 PowerShell Decode & Encode – One-Liners | CheatSheet appeared first on ShellHacks.| ShellHacks
One often-overlooked security risk in Active Directory is the ability to create user accounts without a password (with a blank password). In this article, we’ll explore whether it’s possible to… The post How to Find AD Users with Blank Passwords (Password-Not-Required) appeared first on Windows OS Hub.| Windows OS Hub
Starting with build 24H2, Windows 11 includes a built-in sudo command. This command allows running commands as an administrator directly from an unprivileged (non-admin) CMD/PowerShell/Terminal session. By default, the sudo…| Windows OS Hub
Objective In this article I will walk you through installing progressive web app’s, or PWA’s to endpoint machines using either PowerShell or Microsoft Intune. You may want to do this for users with frontline licenses that grant them web apps but not full desktop application's. What are Progressive Web Applications? Progressive Web Apps (PWAs) are| The Lazy Administrator
The next part! Create an image in Nerdio using PSNerdio. So, the next step is of course creating an image in Nerdio.| NielsKok.Tech
Three new Graph API resources provide easy access to Entra ID authentication method summary data. The information is helpful to understand the type of sign-ins that happen, and the authentication methods used by user connections. The article includes a script based on the MFA sign-in summary to highlight non-MFA connections and the apps users connect to.| Office 365 for IT Pros
Learn how to enable Entra ID-based SSH logins for Linux servers managed with Azure Arc. Eliminate SSH key sprawl, improve auditing, and enforce Conditional Access, RBAC, and MFA for secure, streamlined remote access.| Mindcore Techblog
I recently had to copy an Azure SQL database (SQL db) from one subscription to an Azure SQL Server instance ... Continue reading| SQL Studies
BadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze its mechanics. The post When Good Accounts Go Bad: Exploiting Delegated Managed Service Accounts in Active Directory appeared first on Unit 42.| Unit 42
I have updated the AzPolicyTest PowerShell module (GitHub, PowerShell Gallery) to v2.8.0. This release includes the following updates:| Managing Cloud and Datacenter by Tao Yang
A common question about Azure Policy I frequently get asked during customer engagements is how can a user find out what restrictions are applied for a given resource in their landing zones.| Managing Cloud and Datacenter by Tao Yang
I hope I am not the only one who’s struggling with git commands and parsing the results in PowerShell scripts.| Managing Cloud and Datacenter by Tao Yang
Dynamic Microsoft 365 Groups come with many advantages, but they also require Entra P1 licenses. This article explores how to create and maintain a DIY version of dynamic Microsoft 365 groups using the Microsoft Graph PowerShell SDK and Azure Automation. At the end of the day, the principle is proven, but maybe it's best to pay for the licenses. The post Practical Graph: Creating Dynamic Microsoft 365 Groups without Entra P1 Licenses appeared first on Practical 365.| Practical 365
In this blog, we explore how IT admins can leverage WinGet, Microsoft’s Windows Package Manager, to streamline application deployment and updates across Intune-managed devices. The post Using WinGet with Intune appeared first on Practical 365.| Practical 365
Verticals Targeted: Government Regions Targeted: US Related Families: StealC, RedLine, NetSupport RAT, DeerStealer, HijackLoader, SectopRAT Executive Summary CastleLoader, a versatile malware loader, has infected 469 devices since May 2025, leveraging Cloudflare-themed ClickFix phishing and fake GitHub repositories to deliver information stealers and RATs. Its sophisticated attack chain, high infection rate, and modular design make it a significant threat to organizations, particularly U.S. g...| PolySwarm Main Blog
Explore how to securely manage remote access to Linux servers using Azure Arc and Entra ID in Part 2 of our series. Learn how to eliminate VPNs and jump hosts with RBAC, PIM, Conditional Access, and SSH key automation for a Zero Trust architecture.| Mindcore Techblog
The Connect-IPPSSession cmdlet is needed to connect to the Security and Compliance endpoint to update a Microsoft 365 retention policy. Unhappily, the Security and Compliance module doesn’t support managed identities, which makes it harder to run Connect-IPPSSession securely in an Azure Automation runbook. In the end, we use a credential stored in the automation account. And then we had to disable WAM. All explained here.| Office 365 for IT Pros
Recently, we at K7 Labs saw a tweet about the Cmimai Stealer, a VBS (Visual Basic Script) infostealer that began […]| K7 Labs
Some steps repeated over and over again to verify domain connectivity…. nltest /dsgetdc:domain.topklist get cifs/node.domain.topklist cloud_debugResolve-DnsName _ldap._tcp.dc._msdcs.domain.top -type srvResolve-DnsName _kerberos._tcp.dc._msdcs.domain.top -type srvTest-NetConnection controller.domain.top -port 389Test-NetConnection controller.domain.top -port 88Test-NetConnection controller.domain.top -port 445| The knack
In 2022 we wrote a post about SharePoint and OneDrive integration with Microsoft Entra B2B. As of 2025, the information in this post remains relevant for tenants created before June 2023; tenants provisioned after that date have Entra B2B integration enabled by default. Now, only one command is needed instead of two as before. An […]| Mindcore Techblog
Let's learn how to use the PsExec utility tool in Windows 11. This tool is a command-line utility built for Windows by Microsoft. PsExec allows system| How to Manage Devices Community Blog Modern Device Management Guides
Let's learn about how to Kill Processes using PsKill in Windows 11. The PsKill is a compact tool of PsTools that works to forcefully stop a process/end a task| How to Manage Devices Community Blog Modern Device Management Guides
After being asked whether licenses are needed to include shared mailboxes in Microsoft 365 retention policies, I investigated and found that licenses are not. This led to a consideration of the steps needed to create a special retention policy for shared mailboxes (with PowerShell, naturally) and how to avoid retention setting collisions with other policies. All explained in detail here.| Office 365 for IT Pros
If you use the Microsoft Graph PowerShell SDK, you don’t need to worry about obtaining an access token because SDK cmdlets include automatic token management. Although you don’t need to know the details of the access token used in an SDK session, it’s possible to find and examine its contents, and even use the token with a Graph request. It's a nice to know thing that you’ll never need in practice.| Office 365 for IT Pros
Second part of the series! This part is about linking all required resources to nerdio via PSNerdio. So, in the previous part of this series I mentioned that the PowerShell module created by Nerdio needs some love. I wanted to link my resourcegroups to Nerdio and that CMDlet was not working. So, I’m going to ... Read more The post Linking all required resources to Nerdio via PSNerdio appeared first on NielsKok.Tech.| NielsKok.Tech
A banner posted in the Entra admin center informs administrators that Entra ID governance features used by guest accounts incur charges from June 2025. This only affects Microsoft 365 tenants that use ID governance for features like inactive guest access reviews, but unexpected charges might come as a surprise. This article explains a PowerShell script to find chargeable events in audit logs and how to calculate likely charges.| Office 365 for IT Pros
The August 2025 update for the Automating Microsoft 365 with PowerShell eBook is available for subscribers to download. The eBook now includes over 350 content-rich pages packed full of practical examples of how to use PowerShell to automate Microsoft 365 operations. It’s an essential tool for anyone who needs to use PowerShell in a Microsoft 365 environment.| Office 365 for IT Pros
On updated tenants, external file sharing is now enabled in both 1:1 and group chats. MC1102790 Roadmap ID 492625 When this feature is not enabled you will not see an attach file option when chatting with an external user. To share a file, you must first share the file from your OneDrive and then add […] The post Microsoft Teams can now attach files in external chats appeared first on Mindcore Techblog.| Mindcore Techblog
In this first Azure Arc Remote Management focused blogpost, let’s cover the OpenSSH extension and how it can be used to get a remote PowerShell connection over SSH and even a Remote Desktop Session, all without any direct network connectivity. The best part: It costs absolutely nothing! Join me in this adventure to more securely […] The post Modern Server Management with Azure Arc – Remote Management Pt.1 (SSH/RDP) appeared first on Mindcore Techblog.| Mindcore Techblog
In this post, we’ll look at suppressing single sign-on (SSO) consent prompts for Azure Virtual Desktop (AVD) and Windows 365. These consent prompts can be very disruptive as they interrupt the smooth sign-in flow. I first came across the option to suppress SSO consent prompts while testing Windows 365 Link devices. If your organization is […] The post Say Goodbye to SSO Consent Prompts for AVD and Windows 365 appeared first on Mindcore Techblog.| Mindcore Techblog
With the release of DCSv3, I was excited to give it a try at-scale but since it hasn’t been integrated into Azure Machine Configuration (yet…) I figured I’d try a different approach to deploying and testing it. A lesser-known feature of Azure and Arc machines are Run Commands. Typically used for quick diagnoses or troubleshooting […] The post Modern Server Management – Exploring Azure Arc Run Commands using Bicep appeared first on Mindcore Techblog.| Mindcore Techblog
Managing server configurations in hybrid or on-premises environments can be challenging, with outdated tools and manual processes leading to errors and inefficiencies. This post explores how to simplify configuration management with Desired State Configuration (DSC) and Azure Automanage Machine Configuration. Ever noticed this Machine Configuration option under VMs and wondered how it works? Me too! […] The post Azure Automanage Machine Configuration Introduction – Configuration as Code a...| Mindcore Techblog
After writing about how to copy group memberships from one user to another, the question arises about removing members from groups. The answer is straightforward when dealing with members of distribution lists and mail-enabled security groups, but things become more complicated when working with Microsoft 365 groups and it’s important to handle group owners correctly.| Office 365 for IT Pros
Retention policies and retention labels have been around for about 8 years. Some of the older retention settings might use file created dates to remove items. No doubt basing retention on creation dates made perfect sense at the time, but experience shows that maybe basing retention on the last modified date can be better. All explored here together with a script to update retention labels in OneDrive.| Office 365 for IT Pros
Version 2.29 of the Microsoft Graph PowerShell SDK can now be downloaded from the PowerShell Gallery. Initial tests show that the release is stable. However, it’s recommended that you deploy V2.29 on a few workstations to test essential scripts before proceeding to a full-scale roll-out. V2.29 does not address the issue with PowerShell runtime in Azure Automation, but overall, first indications are that V2.29 is a good release.| Office 365 for IT Pros
Sometimes tenants need to copy group membership from one user to another. Often PowerShell is used, but with the demise of the Azure AD module you might need to update the script that you use. Things are a little more complicated when using the Graph, but where there’s a will, there’s a way. Here's how to use the Graph PowerShell SDK to do the job.| Office 365 for IT Pros
The conditional access policy condition for token protection now extends to Microsoft Graph PowerShell SDK interactive sessions. Any account within the scope of a CA policy that requires token protection can use Web Account Manager (WAM) to sign in and check that everything is secure and ready to go. It’s a protection that might be of interest to administrators and developers that access sensitive data in Graph SDK sessions.| Office 365 for IT Pros
Recent problems with Microsoft 365 PowerShell modules afflicted the ability of Azure Automation runbooks to execute cmdlets Microsoft Graph PowerShell SDK and Exchange Online Management modules. The root cause is a decision to remove support for .NET6, but the worrying point is the lack of awareness within Microsoft engineering that Azure Automation is where many critical scripts run. Better pre-release testing is definitely needed.| Office 365 for IT Pros
Microsoft 365 tenants with Entra P1 or P2 licenses can use a custom banned password list to stop people using specific terms in their passwords. The idea is to prevent easily-guessed terms being used in passwords. You could also block words deemed to be objectionable. In any case, this article explains how to maintain the custom blocked password list with a PowerShell script.| Office 365 for IT Pros
Sometimes it's hard to get a response back from running a Graph API request with the Invoke-MgGraphRequest cmdlet. Graph Explorer helps. So does reading Microsoft’s documentation for the cmdlet. In the end, everything works out and we can discover some valuable information that comes back in a response header. In this case, the response header helps us discover if a purge job works.| Office 365 for IT Pros
A user reported that a script didn't list any details of hidden group memberships and asked why. The reason is that a separate Graph permission controls access to hidden group memberships. If an app doesn’t have the permission, the Graph returns null memberships, which is probably not all that helpful. Once the right permission is in place, everything works.| Office 365 for IT Pros
The June 2025 update for the Automating Microsoft 365 with PowerShell eBook is now available. Coding automation with Microsoft 365 PowerShell can be challenging, but not with this book beside you. It contains hundreds of examples of working with Entra ID, Exchange Online, SharePoint Online, OneDrive for Business, Teams, and Planner using regular PowerShell cmdlets and the Graph APIs.| Office 365 for IT Pros
On May 10, 2025, Microsoft released V2.28 of the Microsoft Graph PowerShell SDK in the hope that the new version would fix a bunch of annoying problems that have dogged the SDK for several months. The first few days haven’t revealed any new problems and bug reports are being closed, so the signs are positive. But do test before deploying V2.28 into production.| Office 365 for IT Pros
Copilot usage data can be pretty sparse, but it's easy to enhance the data to gain extra insight into how Microsoft 365 Copilot is used within a tenant. In this case, an administrator wanted to have department and job title information available for each Copilot license holder, so we combined the Copilot usage data with details of Entra ID user accounts with Copilot licenses to create the desired report.| Office 365 for IT Pros
Some new Graph APIs were announced on April 1 to close a feature gap with EWS. The new APIs permanently remove mailbox items and other objects, including folders, calendars, and calendar items. Permanent deletion means that items cannot be recovered through clients because they end up in the Purges folder in Recoverable Items. This article explains how the new APIs work, including a practical example.| Office 365 for IT Pros
Like other Microsoft 365 workloads, you can manage SharePoint Online settings with PowerShell. The module deals with site and tenant settings.| Office 365 for IT Pros
I have a customer that uses Intune AutoPatch and wanted to add devices to groups based on domain suffix of the primary user. So I started to add this functionality to my popular script...| Mr T-Bone´s Blog
Hi, let's discuss Start or Stop Automatic Maintenance in Windows. Automatic Maintenance is a feature in Windows that allows the user to run scheduled tasks to| How to Manage Devices Community Blog Modern Device Management Guides
For the first time in a long time, Windows has re-entered my life now that I work at Microsoft. In macOS land, I use iTerm and oh-my-zsh to make a pretty shell environment with all the colors and such, so when I got to Windows again and lanched into the| Jonathan Creamer
В Windows 10 и 11 доступна функция «случайный MAC адрес» для рандомизации аппаратного (MAC адреса) сетевой карты, используемого для подключения к Wi-Fi сетям. Основный задачи этой функции – повышение конфиденциальности и анонимности пользователя, сокращение возможностей отслежив...| Windows для системных администраторов
Problem Statement| Techdecline's Blog
There is no built-in way in Azure Portal to copy secrets between two Key Vaults located in different subscriptions. The usage of Get-AzKeyVaultSecret is n...| Techdecline's Blog
Using data from machine learning tools, we predict a surge in cloud attacks leveraging reworked Linux Executable and Linkage Format (ELF) files. Using data from machine learning tools, we predict a surge in cloud attacks leveraging reworked Linux Executable and Linkage Format (ELF) files.| Unit 42
In the first installment of Securing Microsoft 365 with Graph Activity Logs, Mezba Uddin dives into the essentials of the Microsoft Graph Activity Log, what it does, its importance for visibility, and how to get it running to start seeing it's data.| Practical 365
Entra ID's password protection feature was introduced back in 2018, adding support for a banned password list, the smart lockout controls and integration with| Blog
I have been really irritated with the EU decision to force end users to accept the SSO in Windows. The EU Digital Markets Act (DMA) SSO dialog, commonly referred to as the “Continue to...| Mr T-Bone´s Blog
This is my latest training exercise, building configuration drift control for Microsoft Intune with PowerShell and the pester module.| NielsKok.Tech
Are you tired of manually running network diagnostics like Ping, Traceroute, or DNS queries? The Globalping PowerShell Module is here to save the day! With its easy-to-use cmdlets, you can automate measurements from probes distributed across the globe. The post Automating Network Diagnostics with Globalping PowerShell Module appeared first on Evotec.| Evotec
Explore powerful updates to PSWriteHTML: use InfoCards, layout Density control, and advanced shadow effects to build clean, responsive PowerShell-generated dashboards and HTML reports.| Evotec
Version 3.1.0 is now available with a variety of fixed based on customer feedback. See the release information for more details: https://github.com/mtniehaus/AutopilotBranding/releases/tag/3.1.0 Note that this version doesn’t use IntuneWinAppUtil.exe directly. Instead, the […]| Out of Office Hours
In my previous post about pre-provisioning, I showed three apps (MDT, Office, and PowerToys) that I was installing as part of a task sequence. What I didn’t show was the details for […]| Out of Office Hours
Let's compare the features of Intune proactive remediation scripts and PowerShell scripts. The proactive remediation script helps detect and fix common| How to Manage Devices Community Blog Modern Device Management Guides
A long time ago, we made the decision to implement some features using batch processes that were scheduled to run at night (most of them as ...| bartwullems.blogspot.com
It's quite easy to query multiple databases in Azure SQL Database with PowerShell. Gone are the days of having to context switch in a GUI.| sqlkitty
Learn how to use PowerShell Replace for efficient text manipulation with our comprehensive guide, complete with examples and best practices. The post Mastering PowerShell Replace: A Comprehensive Guide first appeared on Parveen Singh.| Parveen Singh
Explore the Select-Object cmdlet in PowerShell for efficient data filtering and selection. Learn advanced techniques and practical applications The post PowerShell Select-Object Made Simple: A Beginner’s Guide first appeared on Parveen Singh.| Parveen Singh
На разных компьютерах периодически встречаю проблему очень долгого запуска консоли PowerShell, вплоть до нескольких минут. Это влияет как на запуск самой| winitpro.ru
Master GitHub workflow commands in PowerShell to streamline your development process and enhance productivity with these essential tips.| Coding Stephan
As companies strive to stay ahead in the ever-evolving technological landscape, some have upgraded their domain controllers to Windows Server 2025. While this upgrade brings numerous benefits, it has also introduced a significant problem...| Mr T-Bone´s Blog
Kaspersky researchers analyze GOFFEE’s campaign in H2 2024: the updated infection scheme, new PowerModul implant, switch to a binary Mythic agent.| securelist.com
In preparation for an MMSMOA 2025 session where I am talking about the Autopilot Branding package (among other things), I figured it was a good time to look through the feedback, issues, […]| Out of Office Hours
I was working on some changes to the Autopilot Branding package and testing them out on Windows 11 24H2 and noticed a problem: One of the registry values I was trying to […]| Out of Office Hours
When you initially sign into Windows, by default you’ll see the “pulsing color” screen as first-time “things” are done in the background: You can disable that “first sign-in animation” via GPO, MDM […]| Out of Office Hours
I’ve done a few troubleshooting blog posts over the years, and they are easily the most popular on my site. This one in particular is still going strong (#1 post of all time), almost five yea…| Out of Office Hours
Lampion malware distributors are now using the social engineering method ClickFix. Read our analysis of a recent campaign. Lampion malware distributors are now using the social engineering method ClickFix. Read our analysis of a recent campaign.| Unit 42
It used to be hard to create a report about the storage used by OneDrive for Business sites in an Microsoft 365 tenant. Now it's just a few lines of PowerShell.| Office 365 for IT Pros
I have finally had some time to have a new look at my script to update primary user for devices in Intune. The previous script had some issues when updating mggraph modules to later...| Mr T-Bone´s Blog
I have 3 Mac computers running on the latest version of MacOS, and PowerShell is installed on all of them using Homebrew:| Managing Cloud and Datacenter by Tao Yang
The dig command is an essential DNS troubleshooting tool on Linux and macOS. However, attempting to use it in a Windows Command Prompt or PowerShell will return the errors as follows: ‘dig’ is not recognized as an internal or external command, operable program or batch file. — dig : The term ‘dig’ is not recognized […] The post The Best Windows Dig Equivalent for DNS Queries appeared first on ShellHacks.| ShellHacks
Get-Help command explained in PowerShell. Learn how to view the help information of commands in PowerShell| LazyAdmin
I´m currently working with a multinational company and their device management with Intune. They use delegated administration in Intune based on Scope Tags. In this blog, we’ll explore why scope tags are important, especially... The post Country based Intune Scope Tags with PowerShell or Azure Automation appeared first on Mr T-Bone´s Blog.| Mr T-Bone´s Blog
Imagine you have a list of rules for how your devices should behave. Declared Configuration is like giving your devices a set of instructions and telling them to always follow these rules. Once you...| Mr T-Bone´s Blog
Security Identifier (SID) History is a useful mechanism in Active Directory (AD) migrations. It allows users and groups in a new domain to retain access to resources that still rely on permissions from the old domain. However, once migrations are completed, these historical SIDs can become clutter, posing both security and administrative challenges. While it’s best to remove unnecessary SID History as soon as you’re done migrating, many environments skip this step. Over time, decommission...| Evotec
These are the Top 20 Methods to Increase Windows 11 Performance Optimization. Let's find out the various Settings Performance Optimization methods in Windows| How to Manage Devices Community Blog Modern Device Management Guides
In this article, we dig deeper into the concepts we learned in the first post in the Fun With PowerShell series, including the pipeline.| Katz Got Your Tongue
Introduction In today’s fast-paced digital world, quick response to security incidents is crucial. Sysmon (System Monitor) from Microsoft’s [...]| www.imab.dk
Microsoft Places Viewer Tool for viewing Microsoft Places PowerShell configuration| www.myteamslab.com
a powershell script that shows how to call an Azure OpenAI chat completition endpoint API| NicolD blog
Ensure compliance with Microsoft’s Strong Certificate Mapping enforcement. Learn how PKI Spotlight helps prevent authentication failures.| PKI Solutions
Back when Autopilot v2 was announced, and carried over into the documentation, is a claim: [Windows Autopilot device preparation, a.k.a. Autopilot v2] reduces the time IT spends on deploying device…| Out of Office Hours
Last week I was running a post-conference (postcon) workshop at Fabric February in Oslo. To have a successful postcon, workspaces were needed for all attendees of the workshop. In these workspaces …| Data - Marc