Microsoft Advanced Threat Analytics (ATA) is a platform that enables you to protect your infrastructure from cyber attacks. ATA is using a parsing engine to capture network traffic of protocols such as […]
Microsoft Advanced Threat Analytics (ATA) is a platform that enables you to protect your infrastructure from cyber attacks. ATA is using a parsing engine to capture network traffic of protocols such as […]
Will you be notified when there are changes to group memberships? No? Memberships in groups are particularly interesting. Especially if it is the group of the domain administrators. The following article shows […]
In most cases a blue screen is caused by hardware or driver failure. In this article I show how to find out the cause of the blue screen by using the tool […]
Administering your Azure VM on your Samsung Galaxy or iPhone? Introduced with Windows Server 2012, PowerShell Web Access is a new Windows Server feature which enables you to administer your Windows Server […]
I’ve been thinking about it for a long time. What schould I do with my new Azure computer? Surely I’ll come up with something over time. But for now I still don’t […]
Azure can be tried out for free for a short period. For me it’s the first time I’m playing with Microsoft Azure. Last week I used my subscription to create my first […]
There is more than enough monitoring software around. Most of them are really helpful and superbly done. For those who don’t have such software at hand, there are only 2 options: to do […]
In this article I would like to enlight the purpose of temporary IPv6 addresses. By default, automatic IPv6 setup of Link-Local Addresses is activated on each IPv6 enabled device. This makes IPv6 […]
Access based enumeration enables you to configure advanced display options for shared folders. If a user is mapped to a network drive and this network drive has the Access Based Enumeration Feature […]
Most of us use https. Almost every communication is secured and encrypted with https. In this article I would like to discuss the HTTPS process in more detail and what role certificates […]
There are many encryption and decryption tools around. PowerShell is a Windows built-in tool and you can use it for cryptography as well. In this blog post I am going to play […]
In this blog post, I am going to shed some light on the new Windows Server 2016 Microsoft certifications. Much has changed and, following the general trend in education, it seems !? […]
In this article, a certificate for a digital signature is created to digitally sign files with Windows PowerShell. A digital certificate is usually issued by a Certification Authority (CA). But in this […]
For some reason, I don’t like netstat. Never did. Fortunately PowerShell provides a similar command to netstat: Get-NetTCPConnection. Let’s discover the options of this command in form of this blog post.
Active Directory Domain Services uses pull replication to replicate Active Directory Partitions. This means that the Domain Controller on which replication is started receives the data from the source Domain Controller. It’s like a […]