Using PowerShell to Discover Who Added a Client to Your Domain

Home > Videos > PowerShell > Using PowerShell to Discover Who Added a Client to Your Domain

Using PowerShell to Discover Who Added a Client to Your Domain

Like This Video 0 149 Jason Yoder
Added by March 7, 2017

In this video, PowerShell instructor Jason Yoder shows how to use PowerShell to quickly find who added a new client to your domain.

For instructor-led PowerShell courses, see our course schedule.

Microsoft Windows PowerShell Training

Download the PowerShell script used in this video.

 

Videos You May Like

How to Build in a PSMethod to your PowerShell Code

0 51 0

In this video, PowerShell instructor Jason Yoder shows how to add Methods (PSMethod) to your code using free software that’s added into the PSObject. For instructor-led PowerShell courses, see our course schedule. Microsoft Windows PowerShell Training Download the Building Methods PowerShell script</a> used in this video. <# ╔══════════════════════════════════════════════════════════════════════════════╗ ║ ║ ║ Building Methods ║ ╟──────────────────────────────────────────────────────────────────────────────╢ … Continue reading How to Build in a PSMethod to your PowerShell Code

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 440 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 630 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.