In an IT landscape where antivirus is usually a security compliance requirement on Windows Servers and client endpoints, should you also be installing antivirus software on your Hyper-V host servers? In this article, I’ll discuss the problems, your options, and some best practices that will, I hope, save you some headaches.
The PowerShell variable has many features that help you create reliable scripts. Understanding the most important concepts of the PowerShell variable is essential for everything you do in PowerShell. In the first post of this series, I will explain how to name variables, how to assign values, and how to deal with PowerShell data types.
If accounts are unable to log on, you have to enable Active Directory auditing in order to track user logons. In this post, I will show you how to track down the relevant information.
Quite a few operating systems, including Windows (Internet Explorer and IIS), are affected by the FREAK vulnerability. You can use an SSL FREAK attack checker to determine if your systems are vulnerable and then decide if you have to take countermeasures.
If you are a 4sysops subscriber, you’ve probably noticed that we published more PowerShell beginner articles recently. I put the corresponding links together on one page so you can easily find those introductory articles. I also added a few articles for advanced PowerShell admins.