How to setup detection and motoring for changes made into startup items in Windows registry.
View More Detect and monitor changes to Startup items in Windows Registry via GPOCategory: Windows
How to Find Out Who Unlocked a User Account in AD on Server 2012 R2
It is very important for an Administrator to continuously monitor User Accounts Status Changes in AD to Protect Systems and Data.
View More How to Find Out Who Unlocked a User Account in AD on Server 2012 R2Active Directory replication monitoring tools
The Active Directory Replication Status Tool (ADREPLSTATUS) analyzes the replication status for domain controllers in an Active Directory domain or forest.
View More Active Directory replication monitoring toolsHow to Detect Who Deleted a File on Your SharePoint
Quickly determine who deleted files on a SharePoint site so you can respond appropriately.
View More How to Detect Who Deleted a File on Your SharePointEnable Cortana in Windows 10 to use Chrome instead of Edge browser
Get Cortana to use Chrome browser instead of Edge browser in Windows 10.
View More Enable Cortana in Windows 10 to use Chrome instead of Edge browserMicrosoft Policies Sensors WindowsLocationProvider is already defined – Windows 10 error
Microsoft.Policies.Sensors.WindowsLocationProvider is already defined error when you edit a group policy in Windows 10.
View More Microsoft Policies Sensors WindowsLocationProvider is already defined – Windows 10 errorHow to get a list of software installed on Windows machine
Having a list of installed programs is also useful if you just bought a new computer and you want to install the same programs you had on your old computer. Here is how to create list of installed software and when was installed on your Windows machine.
View More How to get a list of software installed on Windows machineHow to get the uptime info in Windows 10
How do I check and view uptime and boot time of my Windows 10 machine.
View More How to get the uptime info in Windows 10How to Detect Who Modified Mailbox Permissions in Exchange Online
How to Detect Who Modified Mailbox Permissions in Exchange Online and how to protect sensitive mailbox content and prevent data leakage, organizations need to continuously monitor mailbox permission changes and be able to quickly determine what permissions were modified and by whom.
View More How to Detect Who Modified Mailbox Permissions in Exchange OnlineHow to find out what USB device was plugged into your system
How to find out what USB device was plugged into your system – 2 different command lines or GUI tool.
View More How to find out what USB device was plugged into your system