In today’s interconnected world, data sharing is a fundamental aspect of modern computing. One of the protocols that facilitates this exchange is the Server Message Block (SMB), used predominantly in Windows environments. While SMB offers convenient file and printer sharing capabilities, it’s essential to delve into one of its potential […]
Powershell
I have been working on this for while but I am truly happy to announce that I have released a new book. PowerShell for Beginners. In our day and age, working as an IT Pro or even a developer, PowerShell is not a subject that can be missed. I encourage […]
If you have configured specific BitLocker policies in your tenant to silently enable BitLocker and have started enrolling devices, you might encounter an issue related to “escrow/backup.” In some cases, the device may fail to back up the BitLocker Drive Encryption recovery information to your Azure AD. This failure is […]
End-to-end encryption of SMB sessions was introduced in version 3 of the Server Message Block protocol (SMBv3). Windows allows you to configure encryption for all shares or just specific shares. One disadvantage is that the communication will only be encrypted if both parties are running Windows 8 or Windows Server […]
A network adapter is a piece of hardware that connects a computer to a network. A laptop, for example, typically has two network adapters, one for the Ethernet connection and one for the wireless connection. A network adapter, like any other hardware component of a computer, has its own representation […]
A Trusted Platform Module (TPM) chip is a specialized hardware component that provides security-related functions and serves as a secure root of trust for a computing system. It is a microcontroller that is integrated into a computer’s motherboard or added as a discrete component. TPM chips are designed to enhance […]
In my first post regarding this topic I have constructed a simple PowerShell script that exports all the available software on the machine. In the second post I have modified the script so that you can search for a particular application and get the necessary information without having to pass […]
The previous designed script is showing all the uninstall keys which are present on a particular machine in terms of installed Software. But what about if you want to search for a particular application and get this information? You can use the following PowerShell script: # Define the registry paths […]
Credential Guard is a new security feature developed by Microsoft to protect passwords and other sensitive information. Credential Guard stores the secrets in an even more isolated memory. Even Windows processes and device drivers cannot access this isolated memory. It only has a small number of binaries loaded. Without Credential […]
Microsoft Windows can be set up to automatically logon using a pre-defined user account without prompting the user for logon credentials at boot time. Windows retrieves login account information from the registry, specifically three registry values: DefaultPassword,DefaultUserName,\sDefaultDomainName. Anyone who has physical access to the computer can access the computer’s contents, […]
Local user accounts in Windows are accounts that are created and managed on a specific local computer. These accounts are specific to the individual computer and are not part of a domain or network. Each local user account has a unique username and password, which is used to authenticate and […]
Uninstalling applications from our systems is a common task that we all encounter from time to time. Sometimes, finding the right uninstallation information for an application can be a challenge. Fortunately, PowerShell comes to the rescue with its ability to search for application uninstall keys in the Windows registry. The […]