In the IT Pros world, when executing commands these are usually executed within the “System Context”, or better explained with the NT System\Administrator account. The NT AUTHORITY\System account, often referred to as the “system account” or “local system,” is a built-in account in Windows operating systems. It is one of […]
Powershell
OneDrive by Microsoft, previously known as SkyDrive, is a cloud-based storage service that offers users the convenience of storing and synchronizing files, including Microsoft Office documents and photos. Integrated seamlessly into the operating system, OneDrive functions like a regular folder, making it easy for users to interact with their stored […]
To effortlessly retrieve the device’s uptime, indicating the time of its last reboot, execute the command provided below: Get-ciminstance Win32_OperatingSystem | Select -Exp LastBootUpTime Furthermore, there exist notification messages, known as toasts, that prompt users to initiate a reboot via this approach. This method operates seamlessly unless a certain scenario […]
A file extension, denoted by a suffix appended to a foundational filename, signifies the specific file format attributed to that foundational filename. The inclusion of visible filename extensions empowers users to swiftly recognize both the file category and its associated application, thus facilitating prompt detection of potentially deceptive malicious files. […]
Cortana stands as Microsoft’s dedicated personal assistant software, akin to Apple’s Siri. Its primary function revolves around aiding users in accomplishing various tasks, ranging from setting reminders to furnishing answers to queries. For Cortana to operate effectively, delivering personalized experiences and pertinent recommendations, it necessitates the collection of personal information […]
Microsoft Graph PowerShell offers a powerful way to manage and handle administrative tasks for Microsoft 365 and Azure AD through the command line. However, just as with any powerful tool, ensuring security is paramount. This guide delves into the security considerations when using Microsoft Graph PowerShell and presents actionable steps […]
In today’s interconnected world, data sharing is a fundamental aspect of modern computing. One of the protocols that facilitates this exchange is the Server Message Block (SMB), used predominantly in Windows environments. While SMB offers convenient file and printer sharing capabilities, it’s essential to delve into one of its potential […]
I have been working on this for while but I am truly happy to announce that I have released a new book. PowerShell for Beginners. In our day and age, working as an IT Pro or even a developer, PowerShell is not a subject that can be missed. I encourage […]
If you have configured specific BitLocker policies in your tenant to silently enable BitLocker and have started enrolling devices, you might encounter an issue related to “escrow/backup.” In some cases, the device may fail to back up the BitLocker Drive Encryption recovery information to your Azure AD. This failure is […]
End-to-end encryption of SMB sessions was introduced in version 3 of the Server Message Block protocol (SMBv3). Windows allows you to configure encryption for all shares or just specific shares. One disadvantage is that the communication will only be encrypted if both parties are running Windows 8 or Windows Server […]
A network adapter is a piece of hardware that connects a computer to a network. A laptop, for example, typically has two network adapters, one for the Ethernet connection and one for the wireless connection. A network adapter, like any other hardware component of a computer, has its own representation […]
A Trusted Platform Module (TPM) chip is a specialized hardware component that provides security-related functions and serves as a secure root of trust for a computing system. It is a microcontroller that is integrated into a computer’s motherboard or added as a discrete component. TPM chips are designed to enhance […]