One of our techs had their first taste of IPv6 with a dual stack network at home. Of course this dual stack network ended at the edge device, the firewall, but their passion for IPv6 did not. After years of waiting SixXS started their tunnel broken service in 2000, shortly after Hurricane Electric starting their […]
In 2014 one of our techs released a hammer for a password expiry report. Over the last few years it has been updated several times, and as such we are releasing this updated hammer.
Here at Tech With a Hammer we have found a few of our clients use volume licensing from Microsoft for their Office 2016 installations and were affected by the notorious update KB4011039, which was supposed to be a security update for Word 2016. The following hammer can be used to automate the uninstall process.
Recently, here at Tech With a Hammer, one of our technicians was hammering away at a mailbox in Office365, only to find permissions from Set-MailboxPermission still did not grant a user access to the subfolders of the mailbox. In this hammer we will provide you a script that can be used to perform a shotgun […]
Working in a Windows Domain environment, whether it is in the larger campus size enterprise environments or the small medium business markets, it is likely you will come across Remote Desktop Services. Remote Desktop Services rely on having a valid certificate being used by all the services on all servers, or to have a self-signed […]
With Microsoft progressing with how licensing works with Office 365, we are able to mix and match multiple license types in their cloud service. Overtime it can become cumbersome to manage licenses, where users will have the wrong license attached. The following hammer will allow you to run through all your users and attach the […]
get-addresslist | update-addresslist get-globaladdresslist | update-globaladdresslist get-offlineaddressbook | update-offlineaddressbook restart-service BITS get-clientaccessserver | update-filedistributionservice
When it comes to security, we at Tech With a Hammer and found the best approach is to have multiple layers of security. One of the important pieces is incoming mail flow. There are an assortment of solutions that can vary in size and requirements, they can be a virtual machine in your network, a […]
Place holder for the post, need to make something snappy
As hardware becomes old, the operating system running on it, whether it is a virtual machine running in a hypervisor or it’s a bare metal install, will start to exhibit what we here at Tech With a Hammer like to call “Ghost In the Machine Issues”. There will be inexplicable issues, like network drop outs […]