BIOS Password managing with Dell Command | Monitor and workspace One

word image BIOS Password managing with Dell Command | Monitor and workspace One 1

Today I will write me first English private Blog to share with you my project experience.

My learning since a couple of years are everyone is talking about BIOS passwords as part of security but in real life the most BIOS password will be set one time and never change in the time of using the device. With modern work and more mobility, it would be more and more complicated to change BIOS settings because not all devices are in your own network. I will show you in this blog how you could set a BIOS password on a device by PowerShell and Configuration Service Provider (CSP). All scripts are free, and you could use this own your risk without support.

Read more

German Federal Office for Information Security (German BSI) security recommendations for Windows 10

20210511 Screenshot BSI German Federal Office for Information Security (German BSI) security recommendations for Windows 10 3

The German Federal Office for Information Security (BSI) has published new documents on Microsoft Windows 10 and how to secure it. I looked at the BSI security recommendations for Windows 10 before I wanted to report on them. The background to this is that in the past, publications in this direction were sometimes more than outdated when they were published or they were very superficial.

Read more

Intune packaging made simple

Excerpt from the PowerShell execution of the command Invoke-Upload.ps1

I like to work with installation wrappers for packaging. It doesn’t matter whether it’s Microsoft System Center Configuration Manager (SCCM) or Microsoft Endpoint Configuration Manager (MECM) or the Microsoft Deploment Tollkit (MDT), I have also used them for Microsoft Intune packaging.

Read more

Software management with Chocolatey

This time it is about a so-called “freemium” software management solution. Feemium is made up of the two words “Free” and “Premium” and means that the software can be used free of charge, but certain functions cost extra. With mobile apps, this also means banner ads and annoying video commercials, but that is not the case here. This article is exclusively about the free version.

Read more

Update, maintain and use Windows Image Files (WIM)

A screenshot of a cell phone

Since I’m very busy with deployment and rollouts, I thought I’d write a few basic articles that I could refer to. This sometimes saves you some time in workshops for the more interesting things or gives administrators incentives to automate things.

Read more

Creating Users Easily with PowerShell

As most people know, I like to make my life easy at work. That doesn’t mean I’m afraid of work, I just like to automate or simplify it where I can. I like to use PowerShell for this.

Another reason besides the convenience or lack of time why you should solve tasks through scripts is a consistent level of quality. Let’s face it, who doesn’t know this, even if there are checklists, you might forget one step when you get distracted.

Read more

Properly secure and document group policies

GPOBACKUP Properly secure and document group policies 8

It’s been some time since I started working on the first basic version of the script in August 2014, and posted about it on CONET’s blog. This first version came to just 6 lines of code without the header. Since then a lot has happened and the script has grown in the TechNet Gallery. Time for a new article about the script and its function.

Read more

Windows WinRM over HTTPs

A screenshot of a cell phone

Windows Remote Management is no longer a way to think in today’s world. But why do we do it unencrypted? Normally the authentication is done by Kerberos. That’s secure enough for most people. However, Kerberos also has limitations, for example when using local accounts.

In the standard system, communication is via HTTP via TCP port 5985. Why not HTTPS? This is possible, the port TCP 5986 is intended for this. Unfortunately, this is not only missing in the firewall rule templates but also has a few barriers still in the way. We take care of these barriers today.

Read more