Summary This post describes how to use the "Do...Until" loop in PowerShell scripts. Introduction Happy Holidays, everyone. One...
Adding a Hybrid Runbook Worker for Azure Automation
Hey, everybody. Hope you are doing well. If you're not, you are about to be doing better, for I am going to embed a pre-release of "The Force...
SCOM: Access Performance Data with PowerShell
Summary This post describes how to access performance data from SCOM via PowerShell. Introduction One of the most useful...
Use PowerShell to Automate Remote Desktop Connection Manager 2.7 Setup
An issue arises Like many others, I use Microsoft’s Remote Desktop Connection Manager (RDC Man) daily to connect to the Servers I administer. It is...
Initiating Deployed Applications and Task Sequences Using PowerShell
Howdy. I've been spending the past month or so automating a lot of repeatable tasks, none of which have been groundbreaking. Yet, I don't want to...
All Recent Posts
Anticipate, Prepare, Protect | A Security Checklist for a Proactive Defense
Navigating the digital landscape demands more than passive measures; it calls for a proactive...
Protecting Healthcare Data on Personal Devices: Strategies and Solutions
In the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has...
The Essential Role of Intune Management and Patching Strategies in Healthcare IT
In healthcare IT, the management of devices and applications is paramount, more so today as IT...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.