GetSecureScore

How to Install Azure PowerShell Module and Connect to Your Tenant?

Azure PowerShell is a set of modules that allow you to manage Microsoft Azure from the PoSh command line. These modules used when creating and configuring cloud services, managing virtual machines, networks, web applications, and other Azure resources. In this article, we will show how to install Azure PowerShell on Windows 10. The easiest way Read More

GetSecureScore

How to Fix “The execution of scripts is disabled on this system” in PowerShell

Symptoms When you try to run a script in Microsoft Azure Active Directory Module for Windows PowerShell, you receive one of the following error messages: File C:\my_script.ps1 cannot be loaded. The execution of scripts is disabled on this system. Please see “Get-Help about_signing” for more details. File C:\Desktop\myscript.ps1 cannot be loaded because running scripts is Read More

GetSecureScore

How to Use Group Policy to Remotely Install Software

This article describes how to use Group Policy to automatically distribute programs to client computers or users. Original KB number:   816102 Summary You can use Group Policy to distribute computer programs by using the following methods: Assigning softwareYou can assign a program distribution to users or computers. If you assign the program to a user, Read More

GetSecureScore

How to Perform a Windows Autopilot Reset

Windows Autopilot Reset supports two scenarios: In many environments, you regularly need to reset devices to their initial states after they have been in use for some time. For example, an organization might provide temporary employees with Windows devices, which the organization must reset for every new user. Organizations must also reset the computers in Read More

GetSecureScore

Autopilot Deployment: User-driven, Self-deploying and More

User-driven mode Windows Autopilot user-driven mode is designed to enable new Windows 10 or later devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices Read More