Introduction Are you struggling to activate Windows in your cloud-first organisation? As more businesses move to Azure AD (now Microsoft Entra ID) and embrace cloud management, traditional Windows activation methods…
Introduction In today’s hyper-connected workplace, credentials are the gateway to enterprise resources. But what happens when they become the weakest link? As IT administrators, we spend time hardening systems and…
Introduction Managing a diverse IT environment requires precision, control, and automation—and nothing empowers IT professionals more than PowerShell. But what happens when your organisation scales? You need a centralised way…
Outlook Client add-ins enhance productivity but require careful management to ensure compliance and security. Microsoft Intune provides a centralized solution for controlling these add-ins, allowing organizations to block unmanaged ones and set configurations. By using Intune, administrators can maintain a secure and efficient Outlook environment, simplifying management and optimizing user experience.
Introduction Out-of-band (OOB) updates from Microsoft are critical patches released outside the regular "Patch Tuesday" cycle, often addressing high-impact vulnerabilities or bugs. As organisations increasingly adopt Microsoft Intune for modern…
Introduction In a world where endpoint visibility is critical, Sysmon (System Monitor) has become a go-to tool for Windows system monitoring and forensic analysis. However, deploying Sysmon at scale, particularly…
The Windows 10 KB5058379 cumulative update, released on May 13, 2025, as part of Microsoft's Patch Tuesday, aimed to address several security vulnerabilities. However, shortly after its release, users began…
Deploying Grammarly for Windows across multiple computers can streamline your team's productivity and ensure everyone has access to this powerful writing tool. Here's a comprehensive guide on how to deploy…
Introduction Picture this: A critical client email gets flagged as junk. Your internal alert system, silenced by spam filters. These aren’t just minor annoyances—they’re disruptions that can impact operations, SLAs, and…
Managing power settings might not sound exciting, but it’s a crucial part of IT device management. Among the most impactful configurations are System Sleep Timeout and Unattended Sleep Timeout. These…
We use cookies to improve your experience on our site. By using our site, you consent to cookies.
This website uses cookies
Websites store cookies to enhance functionality and personalise your experience. You can manage your preferences, but blocking some cookies may impact site performance and services.
Essential cookies enable basic functions and are necessary for the proper function of the website.
Name
Description
Duration
Cookie Preferences
This cookie is used to store the user's cookie consent preferences.
30 days
These cookies are needed for adding comments on this website.
Name
Description
Duration
comment_author
Used to track the user across multiple sessions.
Session
comment_author_email
Used to track the user across multiple sessions.
Session
comment_author_url
Used to track the user across multiple sessions.
Session
Google reCAPTCHA helps protect websites from spam and abuse by verifying user interactions through challenges.
Name
Description
Duration
_GRECAPTCHA
Google reCAPTCHA sets a necessary cookie (_GRECAPTCHA) when executed for the purpose of providing its risk analysis.
179 days
Statistics cookies collect information anonymously. This information helps us understand how visitors use our website.
Google Analytics is a powerful tool that tracks and analyzes website traffic for informed marketing decisions.
Contains custom information set by the web developer via the _setCustomVar method in Google Analytics. This cookie is updated every time new data is sent to the Google Analytics server.
2 years after last activity
__utmx
Used to determine whether a user is included in an A / B or Multivariate test.
18 months
_ga
ID used to identify users
2 years
_gali
Used by Google Analytics to determine which links on a page are being clicked
30 seconds
_ga_
ID used to identify users
2 years
_gid
ID used to identify users for 24 hours after last activity
24 hours
_gat
Used to monitor number of Google Analytics server requests when using Google Tag Manager
1 minute
_gac_
Contains information related to marketing campaigns of the user. These are shared with Google AdWords / Google Ads when the Google Ads and Google Analytics accounts are linked together.
90 days
__utma
ID used to identify users and sessions
2 years after last activity
__utmt
Used to monitor number of Google Analytics server requests
10 minutes
__utmb
Used to distinguish new sessions and visits. This cookie is set when the GA.js javascript library is loaded and there is no existing __utmb cookie. The cookie is updated every time data is sent to the Google Analytics server.
30 minutes after last activity
__utmc
Used only with old Urchin versions of Google Analytics and not with GA.js. Was used to distinguish between new sessions and visits at the end of a session.
End of session (browser)
__utmz
Contains information about the traffic source or campaign that directed user to the website. The cookie is set when the GA.js javascript is loaded and updated when data is sent to the Google Anaytics server
6 months after last activity
Marketing cookies are used to follow visitors to websites. The intention is to show ads that are relevant and engaging to the individual user.