Active Directory Fundamentals

Find a user's last logon time

Ensuring the security and maintenance of Active Directory user accounts is a critical aspect of system administration. One key piece of information is the last logon time for a user, which helps administrators identify inactive accounts and ensure the security of the network. In this guide, we will explore the process of finding a user’s last logon time in Active Directory using…
Read more
Active Directory Policies

How to disable flash on Adobe Reader using GPO

In a networked environment, managing software configurations centrally is crucial for maintaining system security and performance. For system administrators, one task in this realm is disabling Flash in Adobe Reader DC via Group Policy. This measure is particularly important due to the various security vulnerabilities associated with Flash. This article provides a step-by-step guide on how to…
Read more
Active Directory Policies

How to disable JavaScript in Adobe Reader DC using GPO

For system administrators managing a network of computers with Adobe Reader DC, it’s essential to maintain security and control over the software configurations. One such critical setting is the management of JavaScript execution within PDF documents. Malicious JavaScript within PDFs can be a security threat. Disabling it in a managed environment can help mitigate such risks. This article…
Read more
Active Directory Policies

How to block automatic connection to Wi-Fi Hotspots using GPO

For organizations managing a fleet of Windows devices, ensuring secure and controlled network access is paramount. One aspect of this is preventing devices from automatically connecting to potentially unsecured Wi-Fi hotspots. This article provides a detailed guide for system administrators on how to use Group Policy to block devices from automatically connecting to Wi-Fi hotspots, enhancing…
Read more
Active Directory Policies

How to block connection to non-domain networks via GPO

In the landscape of enterprise IT management, securing network connections is a top priority. One aspect of this is preventing domain-joined computers from connecting to non-domain networks, which can be a significant security risk. This guide provides a comprehensive walkthrough for system administrators on how to block connections to non-domain networks using Group Policy in a Windows domain…
Read more
Active Directory Policies

How to disable notifications for blocked programs in Windows Firewall via GPO

In a managed IT environment, controlling how users interact with security alerts is crucial for maintaining operational efficiency and security. One such aspect is managing notifications from the Windows Firewall, particularly when it blocks programs. This guide provides a detailed walkthrough for system administrators on how to disable notifications for blocked programs in Windows Firewall using…
Read more
Active Directory Policies

How to disable basic authentication for WinRM Service using GPO

In the realm of Windows systems administration, securing communication channels is a critical task. One key aspect of this is configuring the Windows Remote Management (WinRM) service, which allows for remote management of Windows machines. A common security enhancement is to disable basic authentication for WinRM to prevent exposure of credentials in plain text. This guide will walk through the…
Read more
Active Directory Fundamentals

Configuring Port Forwarding in Windows Using NETSH

Port forwarding is a technique used to direct network traffic from one network port to another. In Windows, the NETSH (Network Shell) command-line tool can be used to set up port forwarding. This article provides a detailed guide for system administrators on how to configure port forwarding using NETSH, a task essential for various network management and troubleshooting scenarios. Understanding…
Read more
Active Directory Policies

How to block Windows Spotlight using GPO

Windows Spotlight is a feature in Windows 10 and later versions that displays different backgrounds on the lock screen and offers suggestions on the lock screen. While it can be an engaging feature for individual users, in a business or organizational context, controlling this feature can be crucial for various reasons including maintaining uniformity, reducing distractions, or ensuring compliance…
Read more
Active Directory Policies

How to create GPO to schedule security intelligence updates for Windows Defender

In the ever-evolving landscape of cybersecurity, staying ahead of threats means regularly updating security intelligence. For Windows environments, this is particularly true for Windows Defender, Microsoft’s integrated antivirus and anti-malware solution. As a system administrator, one of your key responsibilities is ensuring that these updates occur frequently and consistently across all…
Read more