Sometimes, you might want to send a computer into power-saving mode remotely or from the command line. The onboard...
Blog
4sysops - The online community for SysAdmins and DevOps
Cisco call handler with Cisco Unity Connection messaging

Many businesses rely on a caller attendant to manage or route phone calls for their business or call center....
Resultant Set of Policy (RSoP), Group Policy Results, and Group Policy Modeling

The Resultant Set of Policy (RSOP) snap-in of the Microsoft Management Console (MCC) helps troubleshoot Group Policy settings. Group...
Find enabled local Group Policy settings with rsop.msc and PowerShell

When it comes to GPO troubleshooting, you might want to find settings that are configured by local Group Policy....
Amazon Inspector: AWS security monitoring

Discover Amazon Inspector, an AWS security monitoring service that provides automated security scans for EC2 instances, AWS Lambda, and...
ConfigMap in Kubernetes

In a previous post, you learned about node selectors and node affinity in Kubernetes. In this post, we will...
A Terraform AWS provider example

Looking for a beginner's guide to using the Terraform AWS provider? This guide will show you how to easily...
TPM, PIN, Passwords, and SID: Managing BitLocker Key Protectors

BitLocker uses symmetric encryption methods to encrypt drives. The key used for this is protected by two encryption layers....
Rancher Desktop: Kubernetes for your Windows, macOS, or Linux desktop

Discover Rancher Desktop, a free, open-source solution for seamless Kubernetes and container management on your desktop, allowing you to...
Node selector and node affinity in Kubernetes

In a previous post, you learned about taints and tolerations in Kubernetes, which enable you to reserve a certain...
Proactive Microsoft 365 monitoring with ENow

Explore ENow Microsoft 365 Monitoring & Reporting, which leverages synthetic transactions to monitor cloud service accessibility that go beyond...
Run Exchange Online commands using Azure Automation

Since Microsoft has made multifactor authentication (MFA) mandatory for connecting to Exchange Online, running commands has become challenging. If...
Secure BitLocker key with a PIN

By default, BitLocker is configured to release the volume master key (VMK) solely through the TPM. However, this might...
Install Git Bash on Windows with git command examples

Git is a version control system used by developers to collaborate and manage changes in their applications. It was...
Install Ansible on Windows

Ansible is an open-source configuration management platform from Red Hat. So isn't Ansible a Linux-only solution? While it is...
Connect to Exchange Online with PowerShell and certificate-based authentication

Connecting to Exchange Online with PowerShell to automate tasks was made slightly more challenging when Microsoft discontinued basic authentication...
Windows file auditing and ransomware protection with PA File Sight

An in-depth look at PA File Sight's Windows file auditing and ransomware protection features, their importance, and their role...
Install winget on Windows Server and activate preview features

Microsoft's latest package manager is included in Windows 10 and 11. However, if you want to use winget on...
Upgrade Proxmox VE 7 to 8

A new version of Proxmox Virtualization Environment (VE) was released soon after the release of Debian 12 (Bookworm). Since...
Configure password managers in Chrome, Edge, and Firefox using Group Policy

All modern web browsers offer password managers that allow users to save website login credentials and automatically fill them...