Display System Information on Windows Desktop with BgInfo
If you manage a large number of servers or workstations running Windows, sometimes it is useful to display basic information about the operating system and environment right on the Windows…
If you manage a large number of servers or workstations running Windows, sometimes it is useful to display basic information about the operating system and environment right on the Windows…
By default, the Windows login screen displays the account of the last user who logged on to this computer and a list of all local users. Windows allows you to…
In a previous article, we showed how to configure proxy settings in Windows via GPO. However, even non-admin users can manually change the proxy settings on their computers. In this…
When you connect a new device to your computer, laptop, or tablet, Windows tries to automatically download and install a corresponding hardware driver. Later, the operating system will automatically update…
You can use Active Directory to securely store backups of BitLocker recovery keys (passwords) from client computers. It is very convenient if you have multiple users using BitLocker to encrypt…
In this article, we’ll show how to install additional fonts on computers in an Active Directory domain using Group Policy and PowerShell script. This guide was tested on current Windows…
In this article, we will show how to update (install) new GPO administrative templates (admx) in the Active Directory domain when upgrading a Windows 10 or Windows Server 2016/2019 build…
When you trying to run an exe, msi, bat, cmd or other executable type of files from a local drive or network folder in Windows, you can see this warning:…
When a domain user logs on to Windows, their credentials are saved on a local computer by default (Cached Credentials: a user name and a password hash). This allows the…
The broadcast protocols NetBIOS over TCP/IP and LLMNR are used in most modern networks only for compatibility with legacy Windows versions. Both protocols are susceptible to spoofing and MITM attacks.…