Microsoft 365 is diverse enough to enrich the capabilities of many types of private businesses. It complements users, applications, networks, devices, and whatnot. However, Microsoft 365 cybersecurity is often compromised and there are countless ways that
Weekly Tip 43
Change the Comment on Multiple Packages:
import-module “<path to SCCM cmdlet file>”
$pack_ids = get-content <path to file containing package IDs>
cd <site code>:
ForEach ($pack_id in $pack_ids) {
Set-CMPackage -id $pack_id -Description “<new comment>”
Write-host “comment set on $pack_id” }
Steps:
Share:
Matt Tinney
Contact Us
More Posts
Mastering Azure AD Connect – A Comprehensive Guide
Modern businesses are fast moving toward cloud-based infrastructure. In fact, cloud-based business is not just a trend anymore but a strategic necessity. Microsoft’s Azure Active Directory (Azure AD) has become a frontrunner in this domain. It
Security Best Practices in SharePoint
Microsoft SharePoint is an online collaboration platform that integrates with Microsoft Office. You can use it to store, organize, share, and access information online. SharePoint enables collaboration and content management and ultimately allows your teams to
What to Look for in Cloud Security? How Managed Service Providers Can Help You Secure Your Cloud-based Business?
The need to use cloud computing and make it all secure has never been more pronounced. Organizations are fast turning to the cloud to fulfill their computing needs and their concerns for the security of the
Windows Server Backup vs. Third-Party Backup Solutions: Which One Is Right for You?
In the realm of data protection, the choice between Windows Server Backup (WSB) and third-party backup solutions is a critical decision. Backup and Recovery solutions are crucial to maintaining the integrity of your data and operations.
The Ultimate Guide to Microsoft Intune
The corporate world is evolving fast. And with that, mobile devices are spreading everywhere. As we venture into the year 2024, they have already claimed a substantial 55% share of the total corporate device ecosystem. You
How to Protect Microsoft 365 from On-Premises Attacks?
Microsoft 365 is diverse enough to enrich the capabilities of many types of private businesses. It complements users, applications, networks, devices, and whatnot. However, Microsoft 365 cybersecurity is often compromised and there are countless ways that