PowerShell error : Install-Module: The term ‘Install-Module’ is not recognized as the name of a cmdlet.
This error Is Manly Because Of The Limitation of cmdlet and resource available on Machine.
This Gallery TechNet Will help you to resolve The Error” Install-Module: The term ‘Install-Module’ is not recognized as the name of a cmdlet.”
While Performing This Step We Need to restart the system So Request You to Save Any unsaved Document Before Following the Below Steps.
To Resolve This We Need to Update. Windows Management Framework 5.1 with the Help of Below Link
Step 2 : When We try the Command Install-Module msonline PS C:\Users\Administrator>Install-Module msonline It Givens Error Install-Module : The term ‘Install-Module’ is not recognized as the name of a cmdlet, function, script file,or operable program. Check the spelling of the name, or if a path was included,verify that the path is correct and try again. At line:1 char :1 +Install-module msonline
Step 3 : To Check the Host version Type Host
Step 4 :if the Host Version 4.0 or Below That Need to Download And Install the Windows Management Framework 5.1
Need to Update. Windows Management Framework 5.1 with the Help of Below Link
As an IT guy, I always encounter problems when untrained users tweak their Internet connection settings. They always make a mistake somewhere and sometimes the solution is to just keep them away from the Internet Options dialog box altogether.
I have worked at many companies that hide the Internet Options tab in Internet Explorer to discourage users from changing the options, which makes sense since network admins are the only ones who are supposed to access these options.
In a controlled environment, companies usually allow only one type of browser like Internet Explorer and those companies usually don’t allow their employees to change the Internet Options like default the homepage and proxy server.
Below is a typical Internet Options window:
There are several ways to disable the Internet Options tabs in IE and I’ll explain the different methods in this post. The first method uses Group Policy, but will only work if you have the Pro or Ultimate versions of Windows. If you are running Home or Home Premium, then skip down to the registry section.
Disable Internet Options in IE via Group Policy
To disable any tab in the Internet Options window, follow these steps below:
Step 1: Click Start and type GPEDIT.MSC in the search bar and hit enter to launch the Group Policy editor window.
Step 2: In the Local Group Policy editor window expand User Configuration > Administrative Templates > Windows Components > Internet Explorer then click on Internet Control Panel.
Step 3: On the right pane of the window, double click on the item you want to disable. For example, to disable the Advanced tab, double click on Disable the Advanced page option.
Step 4: In the properties window, click on the Enabled option and click OK. The Advanced tab in the Internet Options window will now be disabled and removed.
Step 5: Follow the previous steps to disable other items in the Internet Options window. To enable items, just select the Not Configured option in the properties window and click OK.
There you have it! For less savvy computer users who don’t know about GPEDIT, it should discourage them from changing the advanced settings in IE.
Disable IE Options via Registry Editor
The second way to disable tabs in IE options is to use the registry editor. This is a bit more complicated, but is the only option if you can’t access group policy editor.
You can open the registry editor by clicking on Start and typing in regedit. Once there, navigate to the following key:
Note that if you want to disable this option for all users on the PC, navigate to the same key, but under HKEY_LOCAL_MACHINE.
If there isn’t already a key called Internet Explorer under Microsoft, you’ll have to create it manually. Just right-click on Microsoft and choose New – Key. At this point, there are two options. If you want to disable the entire Internet Options dialog, you can create another key under Internet Explorer called Restrictions.
Lastly, you’ll create a new DWORD value in the right-pane inside Restrictions called NoBrowserOptions. Give that a value of 1 and restart Internet Explorer. If you try to go to Internet Options, it will give you an error message.
If you don’t want to disable the whole dialog, but instead just a few of the tabs, then you should create a new key called Control Panel under Microsoft instead of Restrictions. Inside of that, you’ll create DWORD entries that correspond to the tabs:
As you can see above, I created the Control Panel key under Internet Explorer and then created a DWORD entry in the right-pane called AdvancedTab with a decimal value of 1. This removed just the advanced tab from the IE options window.
Hopefully, these methods will allow you to gain more control over Internet Explorer advanced settings in your environment. If you’re having issues, feel free to comment and I’ll try to help. Enjoy!
Although, enabling and disabling Netlogon debugging is quite easy but should only be enabled for troubleshooting purposes and disabled afterwards:
Enable Netlogon debug:
From an elevated command prompt (as administrator), run the following command:
Disable Netlogon debug:
From an elevated command prompt (as administrator), run the following command:
The netlogon debug log can then be found under C:\Windows\debug\netlogon.log
On the netlogon debug log we should look for (find…) the user we are troubleshooting and should be able to find information similar to the bellow:
08/15 16:38:22 [LOGON]  C ONTOSO: SamLogon: Generic logon of CONTOSO.LOCAL\test2016 from ( WIN2K16MEMBER ) (via JUMPSERVER) Returns 0xC000006A
This entry tells you where the bad password came from.
You can refer to the article above for a full description on the Failure Codes.
Log Name: Security
Date: 7/26/2019 11:47:11 AM
Event ID: 4771
Task Category: Kerberos Authentication Service
Keywords: Audit Failure
Kerberos pre-authentication failed.
Security ID: CONTOSO\Administrator
Account Name: Administrator à This should be showing the account you are troubleshooting.
Service Name: krbtgt/CONTOSO
Client Address: ::ffff: 192.168.0.4 à This might not show on this event but if it does this is the IP where the bad password is coming from.
Client Port: 49908
Ticket Options: 0x40810010
Failure Code : 0x18 à This is the Failure Code we should be looking for:The wrong password was provided.
Pre-Authentication Type: 2
Certificate Issuer Name:
Certificate Serial Number:
This was the easy part!
The hard part is often to troubleshoot from the client side as we don’t have any specific procedure to understand what is sending the bad passwords.
An application? A Scheduled Task? A script?
Can be either and/or all of them and for that reason we often need to revisit the client workstation to continue searching for the culprit(s).
Sometimes it is a middle device that connects the user to Exchange, SQL or any other resource and the same steps needs to be taken on each device in the middle that will bring us back to the originating source.
More information: You can also check the bellow articles for more information on troubleshooting information and tips regarding account lockouts:
Active Directory: Bad Passwords and Account Lockout
Inactive Active Directory (AD) user accounts can pose a security risk to organizations, in situations such as when former employees still have active accounts months after leaving the company because HR failed to inform IT, or accounts might be created for a particular purpose but never deleted after the event. Whatever the reason for the existence of such accounts, Active Directory can quickly get out of control, in turn making your systems harder to audit and less secure.
Active Directory Module for PowerShell
The PowerShell module for Active Directory allows system administrators to query Active Directory and generate reports using the resulting data. The AD module for PowerShell is installed by default on Windows Server 2012 domain controllers, or alternatively you can download the Remote Server Administration Tools (RSAT) for Windows 8.1 and install the module using the command below.
Log in as a local administrator, open a PowerShell prompt, type the code below and press ENTER to install the AD module for PowerShell:
Search Active Directory for Inactive Accounts
The Search-ADAccount cmdlet provides an easy way to query Active Directory for inactive user accounts:
Search-ADAccount –UsersOnly –AccountInactive
The above command returns all inactive accounts. To narrow down the results to a specific time range, you can add the –TimeSpanparameter to Search-ADAccount. In the example below, a variable defines the value for the –TimeSpan parameter, using the New-Timespan cmdlet to simplify the input:
It’s worth noting that unlike the LastLogOn attribute, LastLogonTimestamp is synchronized between domain controllers, but can be 9 to 14 days out-of-date, so you should bear this in mind when processing your results.
Another way to simplify the output and count the number of inactive users is to pipe the results to the Measure cmdlet: