jordantheitguy.com Open in urlscan Pro
2606:4700:3030::ac43:9d7f  Public Scan

Submitted URL: http://jordantheitguy.com/
Effective URL: https://jordantheitguy.com/
Submission: On March 29 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

JordanTheITGuy


Home

ConfigMgr
PowerShell
Intune
Office
Security
About

Obisidian Blog Guide


JordanTheITGuy
Home

description: Hi, I'm Jordan, welcome to my site. I've spent the last fifteen years accumulating little pieces of knowledge and I hope some of it helps you. I also offer consulting services, including training.
cover: media/pupper-Dreams-PowerShell.png
cssclasses:
  - table-cards
  - table-cards-cols-1
  - cards
  - list-cards
publish: "true"
exclude: "true"

Cover Post Modified Description

Test-TrustedPublishers 2024-03-29 How to test to see if the trusted publsiher is
configured to allow third party software updates to install/apply.

Obisidian Blog Guide 2024-03-06 Welcome to my guide on how to set up Obsidian as
a simple blog site. When your first getting started with Obsidian Publish as a
method for blogging it can be confusing. Especially if you are moving from a
more traditional CMS solution. This blog posts aims to help you optimize your
workflow while keeping the main features you know and love.

Specific Exceptions are Cool 2023-12-08 PowerShell does really neat stuff when
it trips and falls down. However, not everyone always follows the rules, and
sometimes even when people DO follow the rules it doesn't make any sense.

PowerShell - Get-Help 2023-11-13 There are only a few things in PowerShell you
absolutely must memorize. Regardless of what your skill level in the language
is, these are the three things I would suggest you simply commit to memory.

The creeping danger of CVE-2023-23397 2023-03-15 On March 14th, a new man in the
middle vulnerability was announced. While it certainly wasn't the first of its
kind or the last the way information about the update came to light and the
fragmented responses of organizations worldwide concern me. It's only going to
get worse.

Find Log4J With Intune Proactive Remediations 2021-12-17 How to find potentially
risk files with LOG4J risks

Query Defender for Endpoint Vulnerability Info Part 1 2020-10-05 Understanding
patch compliance is mission critical task for all organizations regardless of
their size or affiliation. What a lot of organizations struggle with is the
different between vulnerabilities and patch compliance. As a result a lot of
companies end up buying expensive third party tools to scan their environment
for vulnerabilities, which happens to include your base Microsoft Patches.

How to make PowerShell Progress Bars 2019-06-24 How to create PowerShell
Progress bars, and use them in simple code structures.

ADR & Upate ID Translation - Sometimes content goes missing, as a result your
automatic deployment rules don't work as intended. Here you will learn how to
determine what content is missing, so you can re-aquire the content you need.

ConfigMgr Client Update - Sometimes, it's really useful to update your ConfigMgr
client using PowerShell. This is a common little script I use in Demo Labs where
there might be multiple Configmgr environments, and management points in the
same domain.

Get Supersedence for KB-ID - Sometimes when Microsoft, or a third party vendor,
releases an update it's useful to track down what update has superseded
something. In particular this is useful if an older update with a critical CVE
included has been superseded by a newer update. If you're familiar with the
ConfigMgr GUI you know you can get this information from the console. However,
that's a lot of clicking. This method let's you get it direct from SQL instead.

Enabling the New Microsoft Teams - Learn to enable the new public preview
version of Microsoft Teams. This short article covers how to configure a teams
admin policy to allow a select set of people in your organization to enable the
public preview.

TimeZone - Sometimes you have users in a ton of different time zones. This
powershell function is something I use to better help me understand what time it
is for my team members around the world.

Query Defender for Endpoint for Vulnerability Info Part 2 - Defender for
Endpoint making a Client Secret to access Data, can sometimes be useful if
properly controlled. Ideally, you should never use a client secret in
production, and instead use a certificate authentication. However, sometimes you
just need some data.


Home
Not found
This page does not exist
Interactive graph

On this page

Powered by Obsidian Publish