In this article I would like to enlight the purpose of temporary IPv6 addresses. By default, automatic IPv6 setup of Link-Local Addresses is activated on each IPv6 enabled device. This makes IPv6 […]
Display only Folders that a User has Access: Configuring Access Based Enumeration on Windows Server 2012/2016
Access based enumeration enables you to configure advanced display options for shared folders. If a user is mapped to a network drive and this network drive has the Access Based Enumeration Feature […]
Most of us use https. Almost every communication is secured and encrypted with https. In this article I would like to discuss the HTTPS process in more detail and what role certificates […]
VLANs are used for Layer 2 logical segmentation. Each VLAN forms its own broadcast domain. Communication between VLANs is only possible by a router, such as a Layer 3 Switch or a […]
There are many encryption and decryption tools around. PowerShell is a Windows built-in tool and you can use it for cryptography as well. In this blog post I am going to play […]
In this blog post, I am going to shed some light on the new Windows Server 2016 Microsoft certifications. Much has changed and, following the general trend in education, it seems !? […]
After some discussions with colleagues they convinced me, against my humble opinion so far, that my blog has made a really rapid start. That makes me happy, but actually I don’t know much […]
In this article, a certificate for a digital signature is created to digitally sign files with Windows PowerShell. A digital certificate is usually issued by a Certification Authority (CA). But in this […]
For some reason, I don’t like netstat. Never did. Fortunately PowerShell provides a similar command to netstat: Get-NetTCPConnection. Let’s discover the options of this command in form of this blog post.
While reading great news and improvements about the Windows 10 Fall Creators Update (1709), it might be useful to find out if the update is already installed or not.
There are two ways for creating Inbox Rules: The user itsself in Outlook or the Exchange Administrator can establish Rules based on specific conditions. In this article I describe the establishing of […]
Active Directory Domain Services uses pull replication to replicate Active Directory Partitions. This means that the Domain Controller on which replication is started receives the data from the source Domain Controller. It’s like a […]
Introduced with Windows Server Core, still most think that this very useful tool is only available on Windows Server Core. I’m talking about sconfig. I remember the discussion with my linux trainer […]