Introduction All the Windows and Windows Server users know that the operating system features a built-in antimalware protection tool named Windows Defender.The UI of this tool has passed through several changes, but that’s not the only way Windows Defender can be managed: a Windows PowerShell module named “Defender” (provided within the operating system’s PowerShell) can Read More
Category: PowerShell
Use PowerShell to Find Installed Software Quickly
by Gayathri R Nayak In certain situations, we may need to check the list of installed software and its version and for this, we can make use of PowerShell. Here at Bobcares, we have seen several such PowerShell related queries as part of our Server Management Services for web hosts and online service providers. Today, we’ll take a Read More
How to Enable Hyper-V on Windows 10
Enable Hyper-V to create virtual machines on Windows 10.Hyper-V can be enabled in many ways including using the Windows 10 control panel, PowerShell or using the Deployment Imaging Servicing and Management tool (DISM). This document walks through each option. Note: Hyper-V is built into Windows as an optional feature — there is no Hyper-V download. Check Read More
How to Export Azure AD All Devices
Step 1, install AzureAD module if you have done this yet. Type “PowerShell” from the start menu >> Right-click on Windows PowerShell and choose “Run as administrator”Type “Install-Module AzureAD” and hit Enter.You’ll be asked to confirm the installation from the PSGallery. Type “A” to select “Yes to All” and hit the Enter key. To update Read More
How to Setup a Password Expiration Notification via Emails
Quick reference, Powershell script is available to download from here. You need to change its file type from .txt to .Ps1 Have you ever had a need to configure notifications for user’s password expirations but found that existing solutions didn’t quite fit the bill? We all know you can use built-in solutions with Windows and Read More
How to Force Log Off One or All Users from Microsoft 365
In situations involving compromised user accounts simply disabling an account is often not sufficient to mitigate the threat especially if the account is actively being using to send SPAM/Phishing email or to download data. There are three supported ways of revoking an active user’s session in Office 365. The first option is found in the Read More