Profile cover photo
Profile photo
Sysadmin Guides
1 follower
1 follower
About
Sysadmin's posts

Post has attachment
In this post we are going to look at a simple script to change AD attributes on a large scale with minimal effort. Although bare in mind every Active Directory structure has it’s differences, parts of the script or the majority of it’s contents may not be…

Post has attachment
In this post we are going to look at using PowerShell to search and delete specific and all calendar meetings and appointments in an Exchange Mailbox. Using the Exchange Management Shell or remotely connecting to the Exchange Server in PowerShell. Query…

Post has attachment
Intriguing or scary, there is no avoiding the inedible. Automation and machine learning is evolving at an alarming rate, however beneficial, it’s no secret that it comes with a multitude of societal problems. Robots are and have been starting to replace…

Post has attachment
In this post we are going to look at using a PowerShell script to automate the process of a planned fail over on multiple replicated Hyper-V virtual machines, on both domain and workgroup servers. What the script does: Requests for user input specifying…

Post has attachment
In this post we are going to look at a simple method to identify all the folders and the folder-sizes a user has in their mailbox Using the Exchange Management Console, type in the command below to output both the path and size of each folder in a…

Post has attachment
In this post we are going to look at using a small PowerShell script to clear the KMS Host your KMS Client’s cache is pointing to and set auto-discovery. Normally if your clients are pointing to a dead KMS host – you will notice that you can’t activate…

Post has attachment
In this small post we are going to look at how to resolve one of the reasons for BackupExec service startup errors. If you are experiencing console errors with Backup Exec 15, it might be worth checking to see if your backup server has recently installed…

Post has attachment
Have you bought a HP Notebook recently? Would it upset you to know it may be silently recording every keystroke. According to Swiss infosec firm ModZero, this is actually happening to a select group of HP Notebooks. -Instructions on how to block the…

Post has attachment
In this post we are going to look at all the crucial components of a KMS Server, whilst also fixing / troubleshooting activation errors. The sub-sections in the post will include- General Requirements Software Protection Service DNS Records Product Keys…

Post has attachment
In this post we are going to look at using the KMS Volume Activation Management Tool to manually activate a product on a workgroup computer inside the network. Before we begin, a good thing to remember when dealing with computers in workgroups is, it’s…
Wait while more posts are being loaded