NTFS Permissions: A Comprehensive Guide

Windows allows users to assign permissions to files and folders, for added security and to control which users can perform specific actions on files and folders. Learn all you need to know about basic permissions, folder permissions, user permissions, explicit permissions, and much more. What are NTFS permissions? NTFS permissions, first introduced with Microsoft Windows…

The post NTFS Permissions: A Comprehensive Guide appeared first on Petri IT Knowledgebase.

Continue reading NTFS Permissions: A Comprehensive Guide

Set-ExecutionPolicy – Mastering PowerShell Execution Policy

PowerShell is considered secure by default due to various design principles and features that Microsoft incorporated into its architecture. These measures aim to ensure that PowerShell provides a robust, yet safe, scripting environment for system administration tasks. One feature of PowerShell that contributes to this are known as execution policies, which can be set using…

The post Set-ExecutionPolicy – Mastering PowerShell Execution Policy appeared first on Petri IT Knowledgebase.

Continue reading Set-ExecutionPolicy – Mastering PowerShell Execution Policy

Upgrade to Windows 11 – The Road Ahead

In this article, you’ll learn some strategies to upgrade to Windows 11. Including learning about the planning and readiness phase. At times, I feel like the lion in Narnia – Aslan – being lectured and roaring back: Do Not Cite The Deep Magic To Me… I Was There When It Was Written. But I was…

The post Upgrade to Windows 11 – The Road Ahead appeared first on Petri IT Knowledgebase.

Continue reading Upgrade to Windows 11 – The Road Ahead

GET-IT: Submit Your Questions for Microsoft Teams Product Manager Anupam Pattnaik

As usual, we are looking forward to our annual Microsoft Teams free 1-day virtual conference, this year coming up November 30. In addition to the customary sessions presented by industry professionals and Microsoft MVPs on everything from managing users in the Admin Center to driving collaboration with proper governance, Petri’s Chief Technology Officer, Stephen Rose,…

The post GET-IT: Submit Your Questions for Microsoft Teams Product Manager Anupam Pattnaik appeared first on Petri IT Knowledgebase.

Continue reading GET-IT: Submit Your Questions for Microsoft Teams Product Manager Anupam Pattnaik

Get-ADComputer: The PowerShell Command for Managing Active Directory Computers

The Get-ADComputer PowerShell cmdlet is a powerful tool for managing AD computers. It can be used to retrieve information about computer objects, search for computer objects based on specific criteria, and perform various actions on computer objects. What is Get-ADComputer used for? Get-ADComputer is a PowerShell cmdlet that retrieves one or more computers from Active…

The post Get-ADComputer: The PowerShell Command for Managing Active Directory Computers appeared first on Petri IT Knowledgebase.

Continue reading Get-ADComputer: The PowerShell Command for Managing Active Directory Computers

Nudge Security Product Review

Nudge Security provides a simple and easy to implement solution to a challenging problem for organizations managing compliance, security, and governance of third-party cloud apps and services. Its simplicity encourages governed use of SaaS apps and the ability to monitor new apps and user signups. Nudge Security is a powerful alternative to complex products like…

The post Nudge Security Product Review appeared first on Petri IT Knowledgebase.

Continue reading Nudge Security Product Review

How to Properly Secure and Govern Microsoft Entra ID Apps

Microsoft Entra ID, formerly Azure Active Directory (AD), is Microsoft’s cloud-native identity management platform. It only takes one compromised Entra ID user account to consent to a rogue app that siphons all the user’s Microsoft 365 data or to take over their mailbox. Business Email Compromise (BEC) amounts to $8 million in losses on a…

The post How to Properly Secure and Govern Microsoft Entra ID Apps appeared first on Petri IT Knowledgebase.

Continue reading How to Properly Secure and Govern Microsoft Entra ID Apps

Mitigate Security Threats: Monitor HTTP Requests with M365 Graph Activity Logs

Microsoft has announced the public preview of Microsoft Graph Activity Logs. This new offering is designed to provide organizations with granular insights into HTTP requests processed within the Microsoft Graph service for a particular tenant. Microsoft Graph Activity Logs offers detailed monitoring of all API requests from various Microsoft 365 apps, SDKs, API clients, and…

The post Mitigate Security Threats: Monitor HTTP Requests with M365 Graph Activity Logs appeared first on Petri IT Knowledgebase.

Continue reading Mitigate Security Threats: Monitor HTTP Requests with M365 Graph Activity Logs

Master SQL Server: SQL Server Management Studio Tutorial

In this SQL Server Management Studio tutorial (SSMS), I will show you the primary database management and development capabilities provided by the tool. Microsoft SQL Server Management Studio (SSMS) is the primary management and development tool for SQL Server and has been since its release back with SQL Server 2000. SSMS provides a graphical interface…

The post Master SQL Server: SQL Server Management Studio Tutorial appeared first on Petri IT Knowledgebase.

Continue reading Master SQL Server: SQL Server Management Studio Tutorial

How to Find and Block Breached Passwords in Active Directory

Cybercriminals love passwords. They’re simple to guess, easy to steal, and can offer unfettered access to a goldmine of data to hold for ransom or sell to other cybercriminals. For those same reasons, compromised passwords are a constant headache for IT teams, who spend far longer than they’d like helping users reset them and fixing…

The post How to Find and Block Breached Passwords in Active Directory appeared first on Petri IT Knowledgebase.

Continue reading How to Find and Block Breached Passwords in Active Directory