In the previous post, we covered how to deploy a centralized log collection and management service based on the Graylog stack (Graylog
+ OpenSearch
+ MongoDB
). Now let’s cover how to send Event Viewer logs from Windows hosts (including Active Directory domain controller events) to Graylog collector.
On some computers, when performing a clean installation of Windows 10 or 11 from a USB stick, you might not be able to choose the edition (version) of the operating…
Local and network HP printers can display various pop-up printer status notifications on client computers, including print job status, low cartridge resource, out-of-paper, low ink level, etc. Frequent pop-up notifications…
- Windows 10Windows 11
Configuring RemoteApps Hosted on Windows 10/11 (without Windows Server)
January 25, 2025If you are using a remote computer to run one or two apps in an RDP session, you will probably find it more convenient to run these programs in the…
Microsoft has disabled the automatic system registry backup task starting with Windows 10 1803. In previous Windows versions, the Automatic Maintenance job ran a scheduler task that copied all the…
The Parental Controls feature in Windows 7 and 8 can be used to limit the allowed logon hours for local user accounts. On Windows 10 and 11, a similar parental…
The password policy, which is enabled by default in Active Directory, sets a maximum age for a user’s password. If the password age exceeds this value, it is considered expired,…
This article describes how to revert to a previous version of Microsoft Office if some apps stop working in your environment after installing the latest update. Rolling back to an…
- LinuxPowerShellWindows 11Windows Server 2022
Send a WhatsApp Message from the CommandLine (Shell)
December 3, 2024You can use the Mudslide console client to send messages to the WhatsApp messenger directly from the command line (shell) or script. Sysops often use it to send notifications to…
Checking a downloaded file’s hash (checksum) allows verifying its integrity and ensuring that the file contents have not been modified. Administrators commonly use MD5/SHA256 checksum verification for downloaded OS distros…