Author Archives: Adam Bertram

How to Install and Configure PowerShell 7 using Ansible

PowerShell 7 is a versatile shell and programming language. Now that it is cross-platform, most system admins need a way to deploy the language to multiple systems automatically. To that end, Ansible is a perfect system to create easy to use playbooks … Continue reading

Comments Off on How to Install and Configure PowerShell 7 using Ansible

How to Use Ansible Vault to Store Secret Keys

With most automation, credentials are needed to authenticate and use secure resources. What has always been a challenge is how best to store those credentials securely. Ansible is an automation system that provides software provisioning, configuration … Continue reading

Comments Off on How to Use Ansible Vault to Store Secret Keys

How to Create a Self-Signed Certificate with PowerShell

Self-signed certificates are an easy way to perform testing and other less important tasks. Self-signed certificates do not have a trusted chain of certificates backing them up and are signed by the user who created it. If you trust the entity that sig… Continue reading

Comments Off on How to Create a Self-Signed Certificate with PowerShell

How to Build a Windows Server Inventory Report for Free with PowerShell

PowerShell is used by many server administrators. Naturally, one of the most used tasks is the ability to build scripts and functions to inventory your servers and understand what your environment has.Read This Article on CloudSavvy IT › Continue reading

Comments Off on How to Build a Windows Server Inventory Report for Free with PowerShell

How to Use the BITS Module to Transfer Files using PowerShell

A lesser-known feature of Windows is the Background Intelligent Transfer Service (BITS). This is a service, primarily for programmers and system administrators, that works to transfer files to and from HTTP and SMB servers.Read This Article on CloudSav… Continue reading

Comments Off on How to Use the BITS Module to Transfer Files using PowerShell

Managing Firewall Rules with PowerShell in Windows

Windows contains a robust, yet easy to use, advanced firewall, and using PowerShell 7 we can easily configure the firewall from the command line. This article covers common commands used in the Windows Firewall and where they may be used.Read This Art… Continue reading

Comments Off on Managing Firewall Rules with PowerShell in Windows

How to Build a Jenkins Build Server

Continuous integration and continuous deployment are two of the core principals of DevOps. Automating the build and deployment processes enables software development teams to make smaller changes more often.Read This Article on CloudSavvy IT › Continue reading

Comments Off on How to Build a Jenkins Build Server

Five Ways a Non-Privileged User Account Can Own Your Network

A hacker can escalate privileges in a domain in many ways, and learning how they work is half the battle in reducing your attack surface. In this post, we’ll go through five ways that a non-privileged user (from now on only called “userâ€�) can uti… Continue reading

Comments Off on Five Ways a Non-Privileged User Account Can Own Your Network

How to Set Up Monitoring to Alert on Windows High System Usage

One of the more overlooked tools in Windows is Perfmon, otherwise known as performance monitor. This utility has many overlooked abilities, one of them being the ability to alert on various metric conditions. In this article, we explore how to properly… Continue reading

Comments Off on How to Set Up Monitoring to Alert on Windows High System Usage