top of page
Search
Oct 6, 20237 min read
Deploy Domain Controllers with PowerShell and JSON (Part 2) - OU Structure and Delegation
This blog will provide an in-depth explanation of the AD delegation model that has been delivered by PowerShell.
50 views0 comments
Sep 1, 20232 min read
Identify and Fix Unquoted Paths Vulnerability Automatically
The unquoted paths vulnerability is a security flaw that occurs when a software application or service running on a system references...
13 views0 comments
Aug 29, 20232 min read
Audit Applocker Rules and Export to Excel
Introduction Reporting on AppLocker rules is crucial to maintaining security. It provides insight into allowed and blocked applications,...
66 views0 comments
Aug 28, 20232 min read
Change MDT Mapped Z: Drive
What occurs when an application uses Z:\ drive during an MDT deployment? How does Z: get changed to another drive letter?
42 views0 comments
Jul 13, 20234 min read
PowerShell's Custom Runtime for AWS Lambda's - Installation
Guide for deploying AWS Powershell Custom Runtime using WSL2.
59 views1 comment
bottom of page