SSH is easy to secure, but that doesn't mean there isn't more work to be done.| Colin Cogle's Blog
Here's how to take your PowerShell script and turn it into the best version of itself.| Colin Cogle's Blog
A quick look at the new features in PowerShell 7 as they pertain to programmers.| Colin Cogle's Blog
В этой статье рассмотрим, как корректно удалить установленные на компьютере PowerShell модули. Обычно это нужно, когда вы хотите очистить систему от старых или| winitpro.ru
What's the best way to find SharePoint sites with the Microsoft Graph PowerShell SDK? Is the Get-MgAllSite cmdlet best or should you use the Get-MgSite cmdlet? Does it matter if you’re looking for one site or many sites? We explore the issue in this article by examining some reasons why you’d choose Get-MgSite and others that drive the decision for Get-MgAllSite.| Office 365 for IT Pros
New Graph APIs allow Entra administrators to restore a conditional access policy with a Graph request. This article explains how to list, restore, and permanently remove soft-deleted conditional access policies using Graph API requests run in PowerShell. Being able to restore conditional access policies removed in error closes a big gap, especially if agents might begin working on policies. Who knows what errors might happen in future.| Office 365 for IT Pros
An assembly clash happens when a PowerShell module attempts to load a .NET assembly only to find that a different version is already loaded in the session. Unhappily, this kind of thing happens far too often with Microsoft 365 modules, which implies that there isn’t a great deal of coordination between different development groups. All you can do is to load modules in the right order.| Office 365 for IT Pros
A change to a Graph beta API meant that some data used to create the user password and authentication report was no longer available. A script update was required. The experience underlines the truth that developers should not rely on the Graph beta APIs because the APIs are prone to change at any time as Microsoft moves them along to become production-ready.| Office 365 for IT Pros
The Office 365 for IT Pros team is happy to announce the availability of the October 2025 update for the Automating Microsoft 365 with PowerShell eBook. Subscribers can download the latest PDF and EPUB files from Gumroad.com. In other news, a new eBook about Exchange Server Subscription Edition (SE) is available. It’s always nice to see new sources of knowledge open up!| Office 365 for IT Pros
Download all OneDrive files for a user with the updated PowerShell script. Learn about the new features, full pagination support and improved multi-threaded performance for fast, reliable OneDrive exports.| Thomas Marcussen
In this guide, I will show you how to install Microsoft Graph PowerShell Module. It| TechPress
This post will show you how to find Microsoft Graph PowerShell scopes. You can install Microsoft Graph PowerShell module and connect to it using| TechPress
Microsoft Teams Phone has improved over the years, but missed call reporting in call queues remains a gap. In this blog, Martin Heusser shows how to use Microsoft Graph and PowerShell to build a custom report that captures missed and answered calls, complete with caller info and agent details. Until Microsoft adds shared call history natively, this DIY approach is a solid workaround. The post Practical Teams Phone: Reporting Missed Calls on Call Queues appeared first on Practical 365.| Practical 365
Attackers keep availing the use of Windows shortcut (.LNK) files to deliver malware. These LNK files normally used as shortcuts […]| K7 Labs
While I was writing part 1, I kept digging into more details on the GPO deployment method and figured that it deserves a post by itself. Here I’ll cover some pitfalls I’ve run into and things to make life easier such as logging the deployments and having a workbook to monitor things. Azure Arc VM […] The post Azure Arc VM Onboarding Pt.2 – GPO Deep-Dive appeared first on Mindcore Techblog.| Mindcore Techblog
Learn how to securely onboard virtual machines to Azure Arc with this intro guide. Explore onboarding methods, security best practices, pitfalls to avoid, and tips for scaling in enterprise environments.| Mindcore Techblog
I´m currently working with a multinational company and their device management with Intune. They use delegated administration in Intune based on Scope Tags. In this blog, we’ll explore why scope tags are important, especially... The post Country based Intune Scope Tags with PowerShell or Azure Automation appeared first on Mr T-Bone´s Blog.| Mr T-Bone´s Blog
Imagine you have a list of rules for how your devices should behave. Declared Configuration is like giving your devices a set of instructions and telling them to always follow these rules. Once you... The post Be prepared for Windows Declared Configuration in Intune appeared first on Mr T-Bone´s Blog.| Mr T-Bone´s Blog
New part of the PSNerdio series! This is the final part and it's about how to deploy dynamic hostpools using PSNerdio!| NielsKok.Tech
The domain Kerberos service account, KRBTGT (https://adsecurity.org/?p=483), is an important account since it is used to sign & encrypt Kerberos tickets. The account is disabled and the password doesn’t change except when moving from Windows 2000/2003 to Windows Server 2008 (or newer). This is a highly privileged account and if an attacker can gain knowledge … Continue reading| Active Directory & Azure AD/Entra ID Security
The Tombstone lifetime (TSL) in Active Directory is the limit as to how long a deleted object can remain in AD. The original value was 60 (days). Windows versions since Windows 2003 SP2 have this set to 180 (days). Note that this also affects backups, how long a backup is valid and replication – if … Continue reading| Active Directory & Azure AD/Entra ID Security
Ensuring proper Domain Controller configuration is key for Active Directory security. Part of this is making sure they are running supported versions of Windows. At this point, DCs should be running at least Windows Server 2016, preferably Windows Server 2019 or 2022. Hold off on deploying Windows Server 2025 DCs for now due to the … Continue reading| Active Directory & Azure AD/Entra ID Security
In every Active Directory domain, there’s the default domain Administrator account. Here are some key items to check: PowerShell for current domain using the AD PowerShell cmdlets:| Active Directory & Azure AD/Entra ID Security
There are several default/built-in privileged groups that should be reviewed: https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-groups PowerShell Script leveraging the Active Directory PowerShell module: https://github.com/PyroTek3/Misc/blob/main/Get-ADBuiltInAdmins.ps1| Active Directory & Azure AD/Entra ID Security
Over the summer, I rebuilt my Active Directory lab environment with multiple regional domains. Instead of manually configuring common issues, I decided to create a PowerShell script to do this for me. My Invoke-ADLabBuildOut script does the following: PowerShell AD lab build out script leveraging the Active Directory PowerShell module:https://github.com/PyroTek3/ADLab| Active Directory & Azure AD/Entra ID Security
Active Directory computers should be reviewed about once a year. Old operating systems can hold back security progress like keeping SMBv1 and NTLMv1 active. Inactive computers should be discovered and disabled when no longer in use (and eventually removed). The OperatingSystem & PasswordLastSet attributes are self-explanatory, though we can use the LastLogonDate which represents the … Continue reading| Active Directory & Azure AD/Entra ID Security
There are several different types of user accounts - at least how they are used. There are standard user accounts, service accounts, and admin accounts.There are numerous user account settings that can make them vulnerable. These configurations include: Inactive - account has not logged on or changed the password in over 180 days which may ...| Active Directory & Azure AD/Entra ID Security
Kaspersky GReAT expert takes a closer look at the RevengeHotels threat actor's new campaign, including AI-generated scripts, targeted phishing, and VenomRAT.| Securelist
It’s been a while since there was an actual release of the Autopilot Branding script, although there were a few “preview” releases as we worked out kinks in the processes. Things …| Out of Office Hours
This article describes the prerequisites and how to run cmdlets from the Teams PowerShell module in Azure Automation runbooks. We also consider when you’d want to consider using Teams PowerShell cmdlets instead of Graph API requests or cmdlets from the Microsoft Graph PowerShell SDK. The bottom line is that it’s possible, but maybe not a frequently-used option.| Office 365 for IT Pros
MC1134747 describes a new permissions requirement for Entra apps that run Teams PowerShell cmdlets. Fixing apps to meet the new requirement is easily done with PowerShell. First, find the apps that use Teams PowerShell (we show two ways), and then assign the two required permissions to the apps. All done with a few lines of Microsoft Graph PowerShell SDK code.| Office 365 for IT Pros
In this blog, we explore practical ways to optimize SharePoint Online performance for large document libraries. From avoiding the 5,000-item list view threshold to using PnP PowerShell and Microsoft Graph API for bulk updates, you'll learn how to keep your libraries fast, responsive, and scalable. The post Optimizing SharePoint Online Performance for Large Document Libraries appeared first on Practical 365.| Practical 365
A reader asked if it's possible to analyze the external meeting participants for Teams online events. The information is available through the Events Graph API, and some PowerShell code written using the Graph PowerShell SDK quickly extracts events to analyze and determine the set of external domains meeting participants come from. The post Practical Graph: Analyzing External Meeting Participants for Teams Meetings appeared first on Practical 365.| Practical 365
In this episode of Practical AI, we explore how to run large language models locally using Jan, a privacy-first, open-source desktop client. With support for Model Context Protocol (MCP) servers, Jan lets you integrate tools like Microsoft Learn directly into your AI workflow—no cloud required. The post Practical AI: Make Your LLM Local with Jan appeared first on Practical 365.| Practical 365
In this article, we explore the best way to configure Microsoft Defender for Servers on Windows. From PowerShell and GPO to SCCM and Defender Security Management, we break down the pros and cons of each method. The post The Best Way to Configure Defender for Servers on Windows appeared first on Practical 365.| Practical 365
Everyone probably knows how to use the Send As and Send on Behalf of permissions to send email from user mailboxes. Here we venture into the same task, but for Microsoft 365 Groups, shared mailboxes, distribution lists, and mail-enabled security groups. Once your permissions are aligned, everything is pretty simple.| Practical 365
I have noticed that the PowerShell console sometimes takes a long time to open. This issue occurs on different computers. In some cases, it can take several minutes for PowerShell… The post Fix: Slow Startup of PowerShell Console and Scripts appeared first on Windows OS Hub.| Windows OS Hub
New part of the PSNerdio series! This part is about how to enrich your image using PSNerdio. So, we are adding scripted actions, applications and schedules to the image. This allows you to create a complete image via PSNerdio. Link to the GitHub repo. Other parts of this series: Deploy Nerdio from an IAC perspective ... Read more The post Enrich your image using PSNerdio appeared first on NielsKok.Tech.| NielsKok.Tech
A custom runtime environment is a way of defining a specific job execution environment for Azure Automation runbooks, including Microsoft Graph PowerShell SDK runbooks. In this article, we create a new environment for PowerShell V7.4, load in some SDK modules, switch a runbook from a system-generated environment, and run some code.| Office 365 for IT Pros
The Office 365 for IT Pros eBook team is proud to announce the availability of update 15 for the Automating Microsoft 365 with PowerShell eBook. The book includes extensive coverage of how to work with Microsoft 365 workloads through standard modules, Graph APIs, and the Microsoft Graph PowerShell SDK, including hundreds of practical examples over 350-plus pages. No fluff, just real-world code.| Office 365 for IT Pros
Intune Endpoint Privilege Management got more and more features in the last months (child process behavior, argument support, etc.), converting it from a relatively basic EPM solution to a competitive product. However even with all that improvements, there are still a few things that are not as intuitive as they could be, so I wanted to show you a few tips and tricks from the field, showing you how you can solve some of the more complex scenarios| Mike's MDM Blog
On Linux or macOS, encoding and decoding with base64 is simple. But on Windows, there’s no built-in base64 command in CMD or PowerShell. That’s why many users search for fast alternative of the base64 command in Windows. The simplest way to convert Base64 encoded/decoded data is to use PowerShell’s ToBase64String and FromBase64String methods. The one-liners […] The post Base64 PowerShell Decode & Encode – One-Liners | CheatSheet appeared first on ShellHacks.| ShellHacks
One often-overlooked security risk in Active Directory is the ability to create user accounts without a password (with a blank password). In this article, we’ll explore whether it’s possible to… The post How to Find AD Users with Blank Passwords (Password-Not-Required) appeared first on Windows OS Hub.| Windows OS Hub
Starting with build 24H2, Windows 11 includes a built-in sudo command. This command allows running commands as an administrator directly from an unprivileged (non-admin) CMD/PowerShell/Terminal session. By default, the sudo…| Windows OS Hub
Objective In this article I will walk you through installing progressive web app’s, or PWA’s to endpoint machines using either PowerShell or Microsoft Intune. You may want to do this for users with frontline licenses that grant them web apps but not full desktop application's. What are Progressive Web Applications? Progressive Web Apps (PWAs) are| The Lazy Administrator
The next part! Create an image in Nerdio using PSNerdio. So, the next step is of course creating an image in Nerdio.| NielsKok.Tech
Three new Graph API resources provide easy access to Entra ID authentication method summary data. The information is helpful to understand the type of sign-ins that happen, and the authentication methods used by user connections. The article includes a script based on the MFA sign-in summary to highlight non-MFA connections and the apps users connect to.| Office 365 for IT Pros
Learn how to enable Entra ID-based SSH logins for Linux servers managed with Azure Arc. Eliminate SSH key sprawl, improve auditing, and enforce Conditional Access, RBAC, and MFA for secure, streamlined remote access.| Mindcore Techblog
I recently had to copy an Azure SQL database (SQL db) from one subscription to an Azure SQL Server instance ... Continue reading| SQL Studies
I have updated the AzPolicyTest PowerShell module (GitHub, PowerShell Gallery) to v2.8.0. This release includes the following updates:| Managing Cloud and Datacenter by Tao Yang
A common question about Azure Policy I frequently get asked during customer engagements is how can a user find out what restrictions are applied for a given resource in their landing zones.| Managing Cloud and Datacenter by Tao Yang
I hope I am not the only one who’s struggling with git commands and parsing the results in PowerShell scripts.| Managing Cloud and Datacenter by Tao Yang
Explore how to securely manage remote access to Linux servers using Azure Arc and Entra ID in Part 2 of our series. Learn how to eliminate VPNs and jump hosts with RBAC, PIM, Conditional Access, and SSH key automation for a Zero Trust architecture.| Mindcore Techblog
The Connect-IPPSSession cmdlet is needed to connect to the Security and Compliance endpoint to update a Microsoft 365 retention policy. Unhappily, the Security and Compliance module doesn’t support managed identities, which makes it harder to run Connect-IPPSSession securely in an Azure Automation runbook. In the end, we use a credential stored in the automation account. And then we had to disable WAM. All explained here.| Office 365 for IT Pros
Recently, we at K7 Labs saw a tweet about the Cmimai Stealer, a VBS (Visual Basic Script) infostealer that began […]| K7 Labs
Some steps repeated over and over again to verify domain connectivity…. nltest /dsgetdc:domain.topklist get cifs/node.domain.topklist cloud_debugResolve-DnsName _ldap._tcp.dc._msdcs.domain.top -type srvResolve-DnsName _kerberos._tcp.dc._msdcs.domain.top -type srvTest-NetConnection controller.domain.top -port 389Test-NetConnection controller.domain.top -port 88Test-NetConnection controller.domain.top -port 445| The knack
In 2022 we wrote a post about SharePoint and OneDrive integration with Microsoft Entra B2B. As of 2025, the information in this post remains relevant for tenants created before June 2023; tenants provisioned after that date have Entra B2B integration enabled by default. Now, only one command is needed instead of two as before. An […]| Mindcore Techblog
Let's learn how to use the PsExec utility tool in Windows 11. This tool is a command-line utility built for Windows by Microsoft. PsExec allows system| How to Manage Devices Community Blog Modern Device Management Guides
Let's learn about how to Kill Processes using PsKill in Windows 11. The PsKill is a compact tool of PsTools that works to forcefully stop a process/end a task| How to Manage Devices Community Blog Modern Device Management Guides
After being asked whether licenses are needed to include shared mailboxes in Microsoft 365 retention policies, I investigated and found that licenses are not. This led to a consideration of the steps needed to create a special retention policy for shared mailboxes (with PowerShell, naturally) and how to avoid retention setting collisions with other policies. All explained in detail here.| Office 365 for IT Pros
If you use the Microsoft Graph PowerShell SDK, you don’t need to worry about obtaining an access token because SDK cmdlets include automatic token management. Although you don’t need to know the details of the access token used in an SDK session, it’s possible to find and examine its contents, and even use the token with a Graph request. It's a nice to know thing that you’ll never need in practice.| Office 365 for IT Pros
Second part of the series! This part is about linking all required resources to nerdio via PSNerdio. So, in the previous part of this series I mentioned that the PowerShell module created by Nerdio needs some love. I wanted to link my resourcegroups to Nerdio and that CMDlet was not working. So, I’m going to ... Read more The post Linking all required resources to Nerdio via PSNerdio appeared first on NielsKok.Tech.| NielsKok.Tech
A banner posted in the Entra admin center informs administrators that Entra ID governance features used by guest accounts incur charges from June 2025. This only affects Microsoft 365 tenants that use ID governance for features like inactive guest access reviews, but unexpected charges might come as a surprise. This article explains a PowerShell script to find chargeable events in audit logs and how to calculate likely charges.| Office 365 for IT Pros
The August 2025 update for the Automating Microsoft 365 with PowerShell eBook is available for subscribers to download. The eBook now includes over 350 content-rich pages packed full of practical examples of how to use PowerShell to automate Microsoft 365 operations. It’s an essential tool for anyone who needs to use PowerShell in a Microsoft 365 environment.| Office 365 for IT Pros
On updated tenants, external file sharing is now enabled in both 1:1 and group chats. MC1102790 Roadmap ID 492625 When this feature is not enabled you will not see an attach file option when chatting with an external user. To share a file, you must first share the file from your OneDrive and then add […] The post Microsoft Teams can now attach files in external chats appeared first on Mindcore Techblog.| Mindcore Techblog
In this first Azure Arc Remote Management focused blogpost, let’s cover the OpenSSH extension and how it can be used to get a remote PowerShell connection over SSH and even a Remote Desktop Session, all without any direct network connectivity. The best part: It costs absolutely nothing! Join me in this adventure to more securely […] The post Modern Server Management with Azure Arc – Remote Management Pt.1 (SSH/RDP) appeared first on Mindcore Techblog.| Mindcore Techblog
In this post, we’ll look at suppressing single sign-on (SSO) consent prompts for Azure Virtual Desktop (AVD) and Windows 365. These consent prompts can be very disruptive as they interrupt the smooth sign-in flow. I first came across the option to suppress SSO consent prompts while testing Windows 365 Link devices. If your organization is […] The post Say Goodbye to SSO Consent Prompts for AVD and Windows 365 appeared first on Mindcore Techblog.| Mindcore Techblog
With the release of DCSv3, I was excited to give it a try at-scale but since it hasn’t been integrated into Azure Machine Configuration (yet…) I figured I’d try a different approach to deploying and testing it. A lesser-known feature of Azure and Arc machines are Run Commands. Typically used for quick diagnoses or troubleshooting […] The post Modern Server Management – Exploring Azure Arc Run Commands using Bicep appeared first on Mindcore Techblog.| Mindcore Techblog
After writing about how to copy group memberships from one user to another, the question arises about removing members from groups. The answer is straightforward when dealing with members of distribution lists and mail-enabled security groups, but things become more complicated when working with Microsoft 365 groups and it’s important to handle group owners correctly.| Office 365 for IT Pros
Retention policies and retention labels have been around for about 8 years. Some of the older retention settings might use file created dates to remove items. No doubt basing retention on creation dates made perfect sense at the time, but experience shows that maybe basing retention on the last modified date can be better. All explored here together with a script to update retention labels in OneDrive.| Office 365 for IT Pros
Version 2.29 of the Microsoft Graph PowerShell SDK can now be downloaded from the PowerShell Gallery. Initial tests show that the release is stable. However, it’s recommended that you deploy V2.29 on a few workstations to test essential scripts before proceeding to a full-scale roll-out. V2.29 does not address the issue with PowerShell runtime in Azure Automation, but overall, first indications are that V2.29 is a good release.| Office 365 for IT Pros
Sometimes tenants need to copy group membership from one user to another. Often PowerShell is used, but with the demise of the Azure AD module you might need to update the script that you use. Things are a little more complicated when using the Graph, but where there’s a will, there’s a way. Here's how to use the Graph PowerShell SDK to do the job.| Office 365 for IT Pros
The conditional access policy condition for token protection now extends to Microsoft Graph PowerShell SDK interactive sessions. Any account within the scope of a CA policy that requires token protection can use Web Account Manager (WAM) to sign in and check that everything is secure and ready to go. It’s a protection that might be of interest to administrators and developers that access sensitive data in Graph SDK sessions.| Office 365 for IT Pros
Recent problems with Microsoft 365 PowerShell modules afflicted the ability of Azure Automation runbooks to execute cmdlets Microsoft Graph PowerShell SDK and Exchange Online Management modules. The root cause is a decision to remove support for .NET6, but the worrying point is the lack of awareness within Microsoft engineering that Azure Automation is where many critical scripts run. Better pre-release testing is definitely needed.| Office 365 for IT Pros
Microsoft 365 tenants with Entra P1 or P2 licenses can use a custom banned password list to stop people using specific terms in their passwords. The idea is to prevent easily-guessed terms being used in passwords. You could also block words deemed to be objectionable. In any case, this article explains how to maintain the custom blocked password list with a PowerShell script.| Office 365 for IT Pros
Sometimes it's hard to get a response back from running a Graph API request with the Invoke-MgGraphRequest cmdlet. Graph Explorer helps. So does reading Microsoft’s documentation for the cmdlet. In the end, everything works out and we can discover some valuable information that comes back in a response header. In this case, the response header helps us discover if a purge job works.| Office 365 for IT Pros
A user reported that a script didn't list any details of hidden group memberships and asked why. The reason is that a separate Graph permission controls access to hidden group memberships. If an app doesn’t have the permission, the Graph returns null memberships, which is probably not all that helpful. Once the right permission is in place, everything works.| Office 365 for IT Pros
The June 2025 update for the Automating Microsoft 365 with PowerShell eBook is now available. Coding automation with Microsoft 365 PowerShell can be challenging, but not with this book beside you. It contains hundreds of examples of working with Entra ID, Exchange Online, SharePoint Online, OneDrive for Business, Teams, and Planner using regular PowerShell cmdlets and the Graph APIs.| Office 365 for IT Pros
Like other Microsoft 365 workloads, you can manage SharePoint Online settings with PowerShell. The module deals with site and tenant settings.| Office 365 for IT Pros
I have a customer that uses Intune AutoPatch and wanted to add devices to groups based on domain suffix of the primary user. So I started to add this functionality to my popular script...| Mr T-Bone´s Blog
Hi, let's discuss Start or Stop Automatic Maintenance in Windows. Automatic Maintenance is a feature in Windows that allows the user to run scheduled tasks to| How to Manage Devices Community Blog Modern Device Management Guides
В Windows 10 и 11 доступна функция "случайный MAC адрес" для рандомизации аппаратного (MAC адреса) сетевой карты, используемого для подключения к Wi-Fi сетям.| winitpro.ru
Problem Statement| Techdecline's Blog
I have been really irritated with the EU decision to force end users to accept the SSO in Windows. The EU Digital Markets Act (DMA) SSO dialog, commonly referred to as the “Continue to...| Mr T-Bone´s Blog
This is my latest training exercise, building configuration drift control for Microsoft Intune with PowerShell and the pester module.| NielsKok.Tech
Are you tired of manually running network diagnostics like Ping, Traceroute, or DNS queries? The Globalping PowerShell Module is here to save the day! With its easy-to-use cmdlets, you can automate measurements from probes distributed across the globe. The post Automating Network Diagnostics with Globalping PowerShell Module appeared first on Evotec.| Evotec
Explore powerful updates to PSWriteHTML: use InfoCards, layout Density control, and advanced shadow effects to build clean, responsive PowerShell-generated dashboards and HTML reports.| Evotec
Version 3.1.0 is now available with a variety of fixed based on customer feedback. See the release information for more details: https://github.com/mtniehaus/AutopilotBranding/releases/tag/3.1.0 Note that this version doesn’t use IntuneWinAppUtil.exe directly. Instead, the […]| Out of Office Hours
In my previous post about pre-provisioning, I showed three apps (MDT, Office, and PowerToys) that I was installing as part of a task sequence. What I didn’t show was the details for […]| Out of Office Hours
A long time ago, we made the decision to implement some features using batch processes that were scheduled to run at night (most of them as ...| bartwullems.blogspot.com
It's quite easy to query multiple databases in Azure SQL Database with PowerShell. Gone are the days of having to context switch in a GUI.| sqlkitty
Learn how to use PowerShell Replace for efficient text manipulation with our comprehensive guide, complete with examples and best practices. The post Mastering PowerShell Replace: A Comprehensive Guide first appeared on Parveen Singh.| Parveen Singh
Explore the Select-Object cmdlet in PowerShell for efficient data filtering and selection. Learn advanced techniques and practical applications The post PowerShell Select-Object Made Simple: A Beginner’s Guide first appeared on Parveen Singh.| Parveen Singh
На разных компьютерах периодически встречаю проблему очень долгого запуска консоли PowerShell, вплоть до нескольких минут. Это влияет как на запуск самой| winitpro.ru
Master GitHub workflow commands in PowerShell to streamline your development process and enhance productivity with these essential tips.| Coding Stephan
As companies strive to stay ahead in the ever-evolving technological landscape, some have upgraded their domain controllers to Windows Server 2025. While this upgrade brings numerous benefits, it has also introduced a significant problem...| Mr T-Bone´s Blog
Kaspersky researchers analyze GOFFEE’s campaign in H2 2024: the updated infection scheme, new PowerModul implant, switch to a binary Mythic agent.| securelist.com
In preparation for an MMSMOA 2025 session where I am talking about the Autopilot Branding package (among other things), I figured it was a good time to look through the feedback, issues, […]| Out of Office Hours
I was working on some changes to the Autopilot Branding package and testing them out on Windows 11 24H2 and noticed a problem: One of the registry values I was trying to […]| Out of Office Hours
When you initially sign into Windows, by default you’ll see the “pulsing color” screen as first-time “things” are done in the background: You can disable that “first sign-in animation” via GPO, MDM […]| Out of Office Hours