Azure Policy: How to Create and Remediate Compliance
A common theme in cloud environments today is the ability to define templates, policies, and procedures. These templates then dictate what can be done and verify that what does exist is correct. A service from Microsoft called Azure Policy is a great way to make that happen.
Active Directory Database Size Monitoring: Building a Monitor
The Active Directory (AD) database is, by far, the most important piece of AD. After all, without the database, AD wouldn't be much good at all. AD needs to be up and active 24 hours a day. It's being depended on for many different services.
DSC Without the Configuration: Using Invoke-DscResource
Prior to Windows Management Framework (WMF) v5, people that wanted to use Desired State Configuration (DSC) in PowerShell to apply configurations to their machines were forced to go through the same procedure if they wanted to provision an entire server or just install a single Windows feature.
How to Create External PowerShell Help for your Functions
One of the most overlooked tasks of a PowerShell scripter is writing documentation and help. Scripters just want to write code and writing PowerShell help to provide the user information on how to execute that code is an often neglected feature. Help, however, is a critical piece of any good PowerShell tool especially when it's being released for public consumption or is part of an important business process.
How to Deal with Dependencies in Your Pester Infrastructure Tests
When writing Pester infrastructure tests, you'll ultimately run across a common problem; dealing with dependencies. Unlike unit tests, infrastructure tests actually run real code and touch the real environment. A real environment is complicated and full of dependencies on compute, networking, storage, etc.
How to Find Active Directory Admin Accounts Authenticated by RODCs
Introduced in Windows Server 2008, read-only domain controllers (RODC) were a secure way to deploy DCs in remote locations. RODCs were read-only which meant that nothing could be directly written to them. This meant that a malicious attacker couldn't add his own user account and have it replicated back to all of the other DCs in an environment. It was much more secure than traditional domain controllers which allowed someone with the appropriate permissions to add objects at will to Active Directory.
How to Manage and Automate AWS EC2 Snapshots with PowerShell
Amazon Elastic Block Store (EBS) is a service that provides storage for Amazon EC2 instances. EBS is what every volume on your EC2 instances runs on. When you rely on a service to run important infrastructure it's wise to ensure that data is backed up. In this blog post, learn how to manage and automate AWS EC2 snapshots using the PowerShell scripting language.
How to use Python WinRM on Linux to Query Windows Hosts
PowerShell Remoting was a huge time-saver when it was introduced with PowerShell v2. Although PowerShell Core has introduced support for SSH, it's still possible to connect to Linux hosts over WinRM from Windows hosts using Python. In this blog post, you're going to learn how to connect to Windows hosts over WinRM using Python on Linux.
How to Check for a Pending Reboot in the Registry (Windows)
Whenever you install software, updates or make configuration changes, it's common for Windows to need a reboot. Many OS tasks sometimes force Windows to require a reboot. When a reboot is pending, Windows add some registry values to show that. In this blog post, you're going to learn how to check for a pending reboot and how to build a PowerShell script to automate the task.
Using PowerShell to set DNS search order on Windows
Do you need to set the DNS search order on a whole bunch of workstations or servers? Do you have PowerShell? Then you're in luck because I'm about to show you how to use PowerShell to set DNS search order on lots of machines at once!