Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Upgrade laptop storage: Clone NVMe / SSD with Clonezilla

Many laptops come with just one M.2 slot, making storage upgrades challenging. Rather than adding an SSD, you have to replace the current one. This operation involves connecting the new SSD externally and booting the system via USB to transfer data. The free open-source tool Clonezilla provides a dedicated feature to simplify this process.

Source

Manage Microsoft PowerToys using Group Policy

Standard users can install Microsoft PowerToys without requiring administrative privileges, which may be undesirable in managed environments. However, certain tools from the PowerToys suite might be beneficial for specific users. Group Policy allows administrators to control which utilities are available.

Source

Limit logon for users and services with Active Directory authentication policies

By default, Active Directory imposes limited restrictions on the protocols or devices a user or service can use to log in. You can implement authentication policies and enforce specific limitations and restrictions to enhance login security. Active Directory offers several methods to disable outdated protocols, such as NTLMv1, or to restrict user logins to particular workstations. This can be achieved through various Group Policy settings, and the Protected Users group automatically enforces a set of security restrictions.

Source

Secure privileged Active Directory accounts using the Protected Users group

Since Windows Server 2012 R2, Active Directory (AD) has included a built-in global security group called Protected Users, designed to enhance the security of its members through predefined authentication policies. Before adding accounts to this group, it is essential to review the necessary prerequisites and monitor related events to ensure smooth implementation.

Source

Add icons to Windows 11 Start with Group Policy

With Windows 11, Microsoft has not only changed the appearance of the Start menu but also its technical underpinnings. However, the Group Policy settings for configuring Start have not been updated. While it remains possible to add icons using Group Policy Objects (GPO), you must accept some limitations.

Source

Analyze memory consumption of Hyper-V VMs

Memory is often one of the most constrained resources on a Hyper-V host, ultimately determining the maximum number of virtual machines (VMs) it can support. As such, accurately assessing the RAM requirements of VMs is critical for effective capacity planning. These requirements can be evaluated using performance counters available in Perfmon.

Source

Windows 11 Zero Trust DNS (ZTDNS): Only permit outbound connections via protective DNS

The Domain Name System (DNS) is susceptible to attacks that redirect clients to malicious services. Technologies like DNSSEC, DoH, and DoT have been developed to mitigate such threats. In addition, Microsoft introduced Zero Trust DNS (ZTDNS) in Windows 11, which blocks all connections unless a trusted and secure DNS server has resolved their IP addresses.

Source

Change Gmail password in Outlook

Several authentication methods are available when using Outlook as an IMAP client for Gmail. Older versions typically rely on username and password, while newer clients support more modern, secure approaches. However, users frequently face challenges accessing their mailbox if a Google account password changes.

Source

Block migration to new Outlook with Group Policy

The new Outlook falls short of meeting the functionality and quality expectations of many businesses, yet Microsoft is pressing organizations to make the switch. To block an unwanted migration to the new client, administrators can configure several Group Policy settings, including one that allows users to revert to the previous version of Outlook.

Source

Create fake users for an Active Directory lab

Active Directory is a core element of most lab environments, and it’s often essential to populate it with realistic data, especially for user accounts. These accounts should feature values for key attributes to reflect a functional directory. Fake user data is available in CSV format, but you'll need to clean it before importing into the directory.

Source

❌