In this article I’ll show you how to use a very simple command that works for the local computer and remote computers and lets your computers speak.
WMI is a powerful feature. In this article, I will retrieve the memory (RAM) of all domain computers and store the output in a file.
Recently I was asked how to show all logged on users. So I had the idea to make a function out of it. And now I’ll share this function to the community. Who […]
In this blog post I show how to find out the Version of PowerShell on the localhost and on remote computers.
It can happen that files have to be deleted regularly or copied somewhere else. This is no problem in itself, as long as you know a little about scripting. But many people […]
PowerShell: Encrypt and store your Passwords and use them for Remote Authentication (Protect-CmsMessage)
When it comes to certificates, many people flee. The topic is not very popular, but everything is not as bad as feared. In this article I will show you how to store […]
In grown environments it often comes to a complete confusion. Employees in departments are group members in groups in which they should not be member of. If there is a clean and […]
Have you always wanted to manipulate Windows error messages? Starting with Windows Server 2012, and of course also with Windows Server 2016 there is the possibility to do this. The prerequisite for […]
Have you always dreamed of fine-tuning permissions? PowerShell JEA makes it possible. The user only sees what he should see and can only do what he should do. With a few simple […]
In articles, blogs and forums I often read that Windows forms the IPv6 address from the MAC address. This process is called EUI-64, and the assumption that Windows (Vista and above) use […]
Enivornment Variables make life easier. In this article I describe how to use environment variables in daily work. And I am going to show some useful examples.
As the headline says, I am going to show you which tools are no longer needed when you are familiar with PowerShell. No long speeches today, just examples. I’m pretty sure some of […]
Active Directory: How does a client find it’s Domain Controllers at the right Active Directory site?
What actually happens in the background when a domain client authenticates itself to the domain? That’s the question for today’s post. Ok, let’s go into the details. We assume that the computer has […]
With WSUS you are able to document the updates status of your computers. But what to do if there is no WSUS available? In this article I describe how to get a […]
IPv6 enabled devices generate Link-Local addresses automatically. Not just Link-Local Addresses, but also a Solicited Node Multicast Address. Solicited Node Multicast Addresses are used by the Neighbor Discovery Protocol (NDP) to discover […]