 
      
    | You are here | tiim.ch | ||
| | | | | colincogle.name | |
| | | | | SSH is easy to secure, but that doesn't mean there isn't more work to be done. | |
| | | | | patrick.wagstrom.net | |
| | | | | A Better SSH for WSL2 | |
| | | | | janikvonrotz.ch | |
| | | | | In my company the user only have user rights on their computers.As you should know you'll face many problems with this restriction. Many users want to install third party software on their computers or add a printer at home.To reduce argues and make the user happy, I'll assign administrator rights for a temporary time. Based on a predefined GPO and based on a list showing which user has administrator rights in a specified time period, my PowerShell script creates new temporary GPO to assign local administrator rights. | |
| | | | | schmitt-nieto.com | |
| | | Delve into Azure technologies with the Chronicloud Series. Access in-depth guides and hands-on labs to enhance your skills and understanding in cloud computing. | ||