PowerShell Arrays

Hello Blog!

Today I’m gonna explain Powershell arrays, which is the most important part of the scripting and coding in Powershell, also having arrays in your code could help you much and ease your coding progress.

Powershell arrays provides a structured data which is combined into an array and stores a fixed-size sequential collection of elements of the any type.

In order to assign an Array, you must create a variable to include the arrays data in it, and you can specify the type of array the variable can reference. Here is the syntax for declaring an array variable.

Syntax:

$C = 16,2,5,1,60,3
$R = 1..6
Continue Reading

Windows Quick Access Shortcut Commands [ My TechNet Wiki Post ]

Access Windows Servcies with MSC Commands.

Hello Wiki, sometimes I see some experts follow GUI pathes in order to access a service panel to configure or rearrange it. However, accessing them through RUN or start menu as a shortcut with just a simple command would make it quickly and easier to access.
Here is some of them I learnt through the years and wanted to share it with Wiki.

Continue Reading

Azure Active Directory ( From Microsoft Docs)

Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. Azure AD helps your employees sign in and access resources in:

  • External resources, such as Microsoft Office 365, the Azure portal, and thousands of other SaaS applications.
  • Internal resources, such as apps on your corporate network and intranet, along with any cloud apps developed by your own organization.

You can use the various Microsoft Cloud for Enterprise Architects Series posters to better understand the core identity services in Azure, Azure AD, and Office 365.

Continue Reading

Microsoft Active Directory Certificate Services [AD CS] Installation

Microsoft Active Directory Certificate Services [AD CS] provides a platform for issuing and managing public key infrastructure [PKI] certificates. On top of securing application and HTTP traffic the certificates that AD CS provides can be used for authentication of computer, user, or device accounts on a network.

Continue Reading

Active Directory Ports

In the series of posts this month we’ve been looking at network ports relevant to security administrators. This note explores the ports used for Active Directory (AD) communications, which is a topic particularly relevant for allowing AD traffic across a firewall. For instance, you may be wondering which ports to open to allow AD replication across internal subnets, or to allow an AD member server on a screened subnet to authenticate to a domain controller on another subnet.

Continue Reading

Step by Step How to Installing and Configuring AD RMS in Windows Server 2016

Introduction

Active Directory Rights Management Services (AD RMS) Data leakage is the unauthorized transmission of information – either to people within the organization or people outside the organization – who should not be able to access that information. One of the major advantages of using AD RMS over other security features such as NTFS permission is that AD RMS permission travels along with the documents.

AD RMS integrates with existing Microsoft products and OS including Windows Server, Exchange Server, SharePoint Server, Microsoft Office Suite and Microsoft Azure.

AD RMS can protect data in transit and at rest. For example, AD RMS can protect documents that are sent as email messages by ensuring that a message cannot be opened even if it is accidentally addressed to the wrong recipient.

Continue Reading