Prevent Users from Changing Proxy Settings in Windows
In a previous article, we showed how to configure proxy settings in Windows via GPO. However, even non-admin users can manually change the proxy settings on their computers. In this…
In a previous article, we showed how to configure proxy settings in Windows via GPO. However, even non-admin users can manually change the proxy settings on their computers. In this…
In addition to operating system security updates and patches, Windows Update provides driver updates for most certified devices. When Windows Update scans your computer and finds that a newer driver…
You can use Active Directory to securely store backups of BitLocker recovery keys (passwords) from client computers. It is very convenient if you have multiple users using BitLocker to encrypt…
In this article, we’ll show how to install additional fonts on computers in an Active Directory domain using Group Policy and PowerShell script. This guide was tested on current Windows…
Group Policy Administrative Templates contain settings that allow administrators to conveniently configure various Windows settings, components, and third-party software. In this article, we will look at how to install new…
When trying to run an EXE, MSI, BAT, CMD, or other executable file type from a local drive or shared network folder in Windows, you may see the Open file…
Windows saves (caches) domain user credentials locally so users can log in without domain access if needed. This feature enables users to log on to their computers even when AD…
Broadcast protocols NetBIOS over TCP/IP, LLMNR, and mDNS (Multicast DNS) are used to resolve names in Windows networks where there is no (unavailable) DNS server (typically, these are home or…
Information security best practices require the computer screen to be locked when the user is inactive (idle) for some time. A Windows user can lock the computer screen themselves (using…
The password policy in an Active Directory domain specifies basic security requirements for user account passwords, such as password complexity, length, frequency of password changes, and so on. A strong…