<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

it-insights

Posted on 12.02.19 by June Castillote

Part 2: Creating your first Azure Automation RunBook

In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook.

Posted on 11.21.19 by June Castillote

Getting Started with Azure Automation: Introduction

One of the most popular automation tools is Azure Automation and this will be a series of posts covering the introduction to Azure Automation, creating automation runbooks, dealing with assets, testing and publishing runbooks.

Posted on 11.19.19 by Mike Kanakos

Find Inactive User Accounts In Your Domain

Active Directory is a directory service that maintains information about users, computers and related objects. Here is how you can find inactive user accounts.

Posted on 11.19.19 by Jeff Edwards

Bring Some Turkey to the Server Room This Thanksgiving

With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin. 

Posted on 11.15.19 by Michael O'Dwyer

Libra Is A Good Idea On Its Own, But Not With Facebook

Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.

Posted on 11.12.19 by Tim Warner

How To Define a Custom Azure Resource Role with PowerShell

In this post, PowerShell expert Tim Warner shows you how you can create a custom Azure Resource Role with PowerShell.

Posted on 11.06.19 by Tim Warner

How to Define a Custom Azure AD Role in the Azure Portal

We've been able to define custom Azure resource roles for awhile now. Today I'll teach you how to create a custom Azure AD role.

Posted on 10.31.19 by Mike Kanakos

Get-CIMInstance Vs Get-WMIObject: What’s The Difference?

PowerShell provides two similar management interfaces for accessing data on a computer: WMI and CIM.

Posted on 10.29.19 by Greg Mooney

Podcast: IT Horror Stories

In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.

Posted on 10.25.19 by Jeff Edwards

Why Retailers Are a Soft Targets to Hackers (And What to Do About it)

Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.