How to Manage Declined Meetings in New Outlook and Classic Outlook

Managing declined meetings in Outlook can sometimes be tricky, especially when transitioning between the New Outlook and Classic Outlook interfaces. This guide explains how to handle declined meetings effectively and provides tips for both versions of Outlook. Showing Declined Meetings on Your Calendar in New Outlook If you’re using the New Outlook for Windows, Outlook for Mac, Outlook Web, Outlook for Android or … Read more

How to Add or Remove Delegated Consented Permissions Using PowerShell

Managing delegated permissions for applications in Microsoft environments is a critical task for administrators. This guide provides a Microsoft Graph PowerShell script to help you add or remove delegated permissions with greater granularity and control. Why Modify Delegated Permissions? Delegated permissions allow an application to act on behalf of a signed-in user. However, there are scenarios where … Read more

How to Revoke User Consent from Applications via My Apps

When managing application permissions in Microsoft environments, users may occasionally grant consent to an app when administrative consent was required instead. Thankfully, Microsoft provides an easy way to revoke user consent via the My Apps portal. This guide walks you through the steps to revoke user-consented permissions and ensure the app is properly reconfigured. Why Revoke User … Read more

Understanding the Wheel Group in RHEL

The wheel group is a special user group commonly used on Unix-based systems, including Red Hat Enterprise Linux (RHEL), to manage access to privileged commands. Users in the wheel group are granted the ability to execute commands as the superuser (root) by using the sudo command. This guide explains how to add a user to the wheel group and … Read more

How to Manage User Account Password Expiry in Linux

Managing user account password expiration is an essential task for Linux system administrators to ensure system security and compliance with organizational policies. The chage command is a powerful tool that allows you to view and modify password expiration settings for user accounts. In this guide, we’ll explore how to check password expiration details, set expiration dates, and … Read more

How to Use the yum history Command in Linux

The yum history command is a powerful tool for system administrators to track and manage package installation and updates on Linux systems. This command provides detailed information about all Yum transactions, making it easier to troubleshoot issues, roll back changes, or audit system modifications. In this guide, we’ll cover how to use the yum history command, interpret its output, … Read more

What is a Kernel Panic and How to Handle It?

A kernel panic is a critical error that occurs when the operating system detects an issue at the kernel level, causing it to freeze and stop functioning. While it may sound alarming, understanding what causes a kernel panic and how to address it can help you resolve the issue calmly and effectively—whether you’re working with … Read more

How to Verify MFA Claims in Security Tokens with Entra ID

Overview Many organizations have asked if it’s possible to determine whether a user has completed Multi-Factor Authentication (MFA) based on claims in a security token, such as a SAML response or OAuth token. In this article, I’ll explain how Entra ID (formerly Azure AD) includes this information in security tokens and how you can verify … Read more