Search and delete old computers
Active Directory administrators are very aware of the security threats posed by inactive computer and user accounts. When AD accounts are not used for long periods of time, they must…
Active Directory administrators are very aware of the security threats posed by inactive computer and user accounts. When AD accounts are not used for long periods of time, they must…
There are several reasons for removing native features from Windows 10. The first is quite simple: why install applications that you don't need? Another is to reduce the size of…
This article presents some useful Powershell commands for extracting information about machines. It is not exhaustive and will be completed over time. It is a collection of commands that can…
There are different methods to check for installed updates. It is possible to check them directly from the computer or remotely from the command line. This article reviews all of…
When attempting to install an update via an .msu file, it is possible to encounter error 0x800f0823. The error message is then « The Windows Modules Installer must be updated before…
When you check the status of the deployment of your packages on the distribution points, you can see that some packages contain a warning. In the details of the message,…
When attempting to boot into PXE, nothing happens and the machine eventually reboots. On the screen, it is possible that no error message is displayed. When you scan the SMSPXE.log,…
In some cases, it may be difficult to find the computer behind a given IP address. SCCM does not natively have a function to find a computer from an IP.…
The logs are an indispensable aid for resolving incidents encountered on SCCM. They allow to solve almost all problems. Some logs are not explicit and you need to know how…
This article presents some useful Powershell commands for extracting data from the DBA. It is not exhaustive and will be completed over time. It is a collection of commands that…