Skip to content
Notes from an IT consultant
Office 365 Tutorials
Type to start searching
Introduction
Cloud
Configuration Management
Powershell
Security
Technologies
Notes from an IT consultant
Introduction
Cloud
Cloud
AWS
AWS
Profile Management
Azure
Azure
Creating an App in Azure Ad to use as a Service Principal
APIManagement
APIManagement
API Management + CI/CD Pipelines
ARMClient
ARMClient
Generate Tokens
Backup
Backup
Upload Hyper-V VMs backups to Storage Blob
IaaS
IaaS
B-Series Performance check
NSG
NSG
Convert NSG data in CSV to ARM templates
SQL
SQL
Copy Azure SQL database
Office 365
Office 365
Office 365 Tutorials
Compliance Center
Compliance Center
Compliance Center
Exchange Online
Exchange Online
Exchange Online Management Shell
Exchange Online helper scripts
Check existing forwarding rules
SPF, DKIM and DMARC records
Configuration Management
Configuration Management
Powershell DSC
Powershell DSC
Ensure Enterprise Vault services are running
Ensure Exchange critical services are running
Hyper-V sample config
Desired State Configuration
WS2016 sample config
Powershell
Powershell
Generate complex password
EventLog
EventLog
Retrieves events from all event logs during a given timespan
Multithreading
Multithreading
Multithreading
Remoting
Remoting
Powershell Remoting
Tutorial
Tutorial
1. Getting started with PowerShell
2. Variables and data types
3. Operators
4. Special Operators
5. Basic Set Operations
6. Conditional logic
7. Loops
8. Switch statement
9. Strings
10. HashTables
11. Objects
12. Functions
13. Classes
14. Modules
15. Profiles
16. Calculated Properties
17. Using existing static classes
18. Built-in variables
19. Automatic Variables
20. Environment Variables
21. Splatting
22. Streams
23. Sending Email
24. PowerShell Remoting
25. PowerShell pipeline
26. Background Jobs
27. Return behavior
28. CSV parsing
29. Working with XML Files
30. Communicating with RESTful APIs
31. SQL queries
32. Regular Expressions
33. Aliases
34. Using the progress bar
35. PowerShell.exe Command-Line
36. Cmdlet Naming
37. Running Executables
38. Enforcing script prerequisites
39. Using the Help System
40. Modules, Scripts and Functions
41. Naming Conventions
42. Common parameters
43. Parameter sets
44. Dynamic Parameters
45. GUI in PowerShell
46. URL Encode/Decode
47. Error handling
48. Package management
49. TCP Communication
50. PowerShell Workflows
51. Embedding Managed Code (C# | VB)
52. Downloading artifacts from Artifactory
53. Comment-based help
54. Archive Module
55. Infrastructure Automation
56. PowerShell Script Analyzer
57. Desired State Configuration
58. Using ShouldProcess
59. Scheduled tasks module
60. ISE module
61. Creating DSC Class-Based Resources
62. WMI and CIM
63. ActiveDirectory module
64. SharePoint Module
65. Introduction to Psake
66. Introduction to Pester
67. Handling Secrets and Credentials
68. Security and Cryptography
69. Signing Scripts
70. Anonymize IP (v4 and v6) in text file
71. Amazon Web Services (AWS) Rekognition
72. Amazon Web Services (AWS) Simple Storage Service (S3)
UserSessions
UserSessions
Logoff Remote User
UtilityFunctions
UtilityFunctions
Get number of week days between dates
Get number of week days between dates
WindowsServices
WindowsServices
Services
Security
Security
Audit
Audit
AD DS
AD DS
Auditing Active Directory Accounts
MSFT CyberSecurity Assessment Statistics
Auditing Active Directory Service accounts
Network
Network
Network Scanning
Windows
Windows
Application Restrictions
Application Restrictions
Running Explorer with admin privileges
Technologies
Technologies
ADCS
ADCS
Removing expired certificates
ADDS
ADDS
Create OU, AD Group and member users
Purge Kerberos tickets
Managed Service Accounts (MSA)
Notify on locked accounts
Account Operations
Password quality report
Test credentials validity
Troubleshooting
ADFS
ADFS
Enable AD FS on Exchange 2016
AppLocker
AppLocker
App Locker
Bitlocker
Bitlocker
Enabling bitlocker for all fixed volumes
Storing BitLocker information in AD
DHCP
DHCP
DHCP policies
Defender
Defender
Add path exclusions sample
EnterpriseVault
EnterpriseVault
Database operations
Exchange
Exchange
Adjusting Exchange memory requirements
FileServices
FileServices
Add NTFS access to folder
Tracking Changes to a Folder
Deduplication
Firewall
Firewall
AllowTrafficFromPTAddressSpace
Configure SCOM firewall rules
Configure SCOM firewall rules
Configure SQL firewall rules
Create Firewall Rules from netstat
GroupPolicy
GroupPolicy
Copies the settings in a GPO to another GPO
Generate reports for all GPOs
WMI Filters
WMI Filters
Create WMI Filters
WMI Filters
HP
HP
iLO
iLO
iLO Cmdlets for Windows PowerShell
Hypervisor
Hypervisor
VMware
VMware
Using PowerCLI to document VMware Infrastructure
LAPS
LAPS
Install
OSImage
OSImage
OS Image Management
SCCM
SCCM
Add permission to SCCM Domain Join Account
Configure Firewall Exceptions on distribution points
Bulk change Device Collection Refresh Cycle
Change drive used for offline servicing
SMB
SMB
Client OS
Client OS
Windows10&8.1
Windows10&8.1
SMBv1 Protocol
Windows7&Vista
Windows7&Vista
SMBv1 Protocol
Server OS
Server OS
Server2008R2&2008
Server2008R2&2008
SMBv1 Protocol
Server2019 2012
Server2019 2012
SMBv1 Protocol
SQL
SQL
Useful Instance Migration/Maintenance Commands
Checking SQL Best Practices
SoftwareManagement
SoftwareManagement
Managing Software with Chocolatey
Office 365 Tutorials
¶
365 Admin Blog