Many IT professionals and others run VMware lab environments for learning, certification prep, evaluation, and other use cases. They...
Create Active Directory users with Power Automate for Desktop

Traditionally, IT may delegate permissions in Active Directory Users and Computers (ADUC) to managers or other users who need...
Azure AD certificate-based user authentication

Certificate-based authentication is an extremely robust and secure mechanism for validating a user's identity. However, until recently, you had...
Passwordless authentication with FIDO2 and Azure Active Directory

Getting rid of unsecure password authentication is becoming a priority for many businesses. Companies using Microsoft's Azure Active Directory...
Sync KeePass for Windows with Android and iOS

Password managers help users juggle numerous accounts and passwords with ease compared to memorizing multiple accounts. Most users will...
DFS Replication

DFS Replication, short for Distributed File System Replication (DFSR), is a Windows Server role service that allows you to...
Microsoft Office 365 Message Encryption: Encrypt email in Microsoft 365

Customers using Exchange Online can take advantage of Microsoft Office 365 Message Encryption (Microsoft OME) as an online service...
Azure Arc: Manage on-prem Windows Server VMs with Azure Resource Manager

Azure Arc allows organizations to extend the Azure Resource Manager control plane from the public cloud to their on-premises...
Have you been pwned? Try Enzoic for Active Directory compromised credentials protection

Have you been pwned? The new compromised credentials protection feature of Enzoic for Active Directory allows you to monitor...
Runecast 6.1: Issue policy for IT security and compliance auditing

Issuing a security and compliance auditing policy across on-premises and multi- and hybrid cloud environments can be a challenge....
Using remote help in Microsoft Intune

Many businesses use Microsoft Intune as part of Endpoint Manager for remote client provisioning, configuration, and management. However, until...
Sync passwords with KeePass to OneDrive, Google Drive, and Dropbox

KeePass is an open-source password manager used to house passwords and other information. However, using modern cloud storage and...
SophiApp: Tweak Windows 10 settings with a GUI

Before creating a "golden" image of Windows 10 for deployment purposes, most organizations tweak many of the default configuration...
Remote Desktop Manager with Devolutions Server: Managing secure privileged access

Learn how to use Devolutions Remote Desktop Manager and Devolutions Server together for secure privileged access management.
Stellar Toolkit for Exchange: Repair database , Migrate to Microsoft 365, , export mailboxes

Repairing, migrating, and exporting Exchange Server data can be challenging. Learn how the Stellar Toolkit for Exchange can make...
Install Windows 11 in a VM on VMware Workstation or ESXi

With the release of Windows 11, many are starting to test the OS on virtual machines. VMware Workstation and...
Configure protection against potentially unwanted apps using PowerShell or Group Policy

Potentially unwanted applications (PUAs) are software apps that do things that border on malicious activity. These can include displaying...
Record actions and create workflows with Power Automate for Desktop (PAD)

Many legacy systems don't offer REST APIs and no way to interact with them programmatically. Microsoft Power Automate for...
Usbipd-win: Access and share USB devices in Hyper-V VMs and WSL

Usbipd-win is an open-source project that allows sharing locally connected USB devices with other machines, including Hyper-V guests and...
Set up a VPN server on Windows with SoftEther and connect clients

SoftEther VPN is an open-source VPN solution that offers a wide range of authentication and connectivity options for multiple...