Active Directory Rights Management Services (AD RMS)
What is Active Directory Rights Management Services? Sensitive information in an Active Directory environment can cause a great deal of trouble if it reaches the wrong hands. Every organization should do all in its power to avoid
DNS and Active Directory
Domain Name System (DNS) is a name resolution method that is used to resolve host names to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a namespace. Active Directory
Active Directory objects: All you need to know
What you’ll learn: Active Directory (AD) is a directory service introduced by Microsoft as a centralized network resource management system. This network is comprised of entities that represent real users or network resources, and the
Difference between Disabled, Expired and Locked Account
Introduction: The process of administering and monitoring the activities of the Active Directory service, which is typically found in Windows Server operating systems, is known as Active Directory management. The major goal of AD management
Microsoft Hello
For quite a long time, we have been following the routine of typing in a password for accessing our computers. Strong password requirements make us set complex passwords which we often tend to forget, and then
The OSI model: What it is and how you can use it
Developed by the International Organization for Standardization (ISO) in 1984 when network computing was at its nascent stage, the Open Systems Interconnection (OSI) model is the visual representation of how information interacts with different mediums—hardware
How to change the IP address of a domain controller
The domain controller (DC) is an integral part of your IT infrastructure. Due to its role within the domain, it’s crucial that any change to its IP is done correctly. The DC’s address is statically
How to create a process via WMI remotely
Creating a Remote Process via Windows Management Instrumentation (WMI) In the realm of system administration, the ability to remotely manage and automate tasks on Windows machines is crucial. This article provides a detailed guide on
Security Account Manager (SAM)
What is the Security Account Manager (SAM)? When you log in to your Windows Operating System, you must enter a password to gain access to the system. Have you ever wondered where your passwords are stored when
Authentication vs authorization process: An explanation
What you’ll learn: Active Directory authentication and authorization are security processes. These processes are necessary for any environment so that the resources of an environment are not misused by anyone. In this article, we will
Creating objects in active directory
You can create objects in Active Directory by using the Active directory users and computers console. Start -> Administrators tools -> Active Directory users and computers. On the Active Directory users and computers console, right click
Access Control List (ACLs) and Access Control Entries (ACEs)
What you will learn: In this article, we will take a look at what an access control list (ACL) and an access control entry (ACE) are, the components that make up an ACL and ACE,
DNS and Active Directory
What is AD DNS? Domain Name System (DNS) is a name resolution method that is used to resolve hostnames to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a
How to resolve an AD account lockout issue
Have you ever been frustrated why your account is getting locked out frequently in active directory? If your AD account keeps getting locked out, then you have come to the right place. Account lockouts are
How to quickly check windows server uptime
Windows Server Uptime is a crucial metric to measure the stability and reliability of a server. It shows how long the server has been running without any interruption. In this article, you will learn how
How to schedule a process remotely via WMI
Remote task scheduling is a critical competency for system administrators managing a network of Windows machines. This article provides a comprehensive guide on how to schedule a process remotely using Windows Management Instrumentation (WMI), without
NTLM authentication and Kerberos Authentication Protocols Explained
What you will learn: A network needs to have security processes put in place to avoid the misuse of its resources. An authentication process goes a big way in identifying whether a person is who
What is Active Directory?
Large organizations depend on Windows Active Directory (AD) to maintain order in the chaos that is managing users, computers, permissions, and file servers. The sheer number of articles available on the internet can disconcert beginners and
Active Directory FSMO Roles Explained
What you will learn from this article: Active Directory (AD) relies on the AD replication process to keep the information updated across all its domain controllers (DC) in the network. This replication is done through
Active Directory Subnets, Sites, and Site links
Active Directory Subnets A single, physical network can be broken into smaller segments called subnets in a process called subnetting. Each subnet on a network is connected by routers. Every device in a network, whether
Understanding Active Directory Tombstone
What are Tombstones in Active Directory? When you delete an object from the Active Directory (AD) database, it’s marked as a tombstone object instead of being fully removed. By default, each tombstone object remains in
Active Directory Basics: Everything you need to know
What you will learn: An organization will consist of multiple employees, devices, contacts, and large amounts of data. It would need to sort all these resources and information in a structured manner for easy access,
How to install the PowerShell Active Directory module
The Active Directory PowerShell module is part of the Remote Server Administration Tools (RSAT) in all Windows Operating Systems. It is a set of PowerShell cmdlets that imparts flexibility in managing Active Directory. While AD management
Removing an Exchange Server Mailbox from your environment
An Exchange server is Microsoft’s on-premises mail and calendar offering that allows organizations to streamline effective communication amongst employees. You will be required to remove Exchange Server Mailbox for the below reasons: When an organization
Configuring Port Forwarding in Windows Using NETSH
Port forwarding is a technique used to direct network traffic from one network port to another. In Windows, the NETSH (Network Shell) command-line tool can be used to set up port forwarding. This article provides
Active Directory Maintenance Checklist
What you will learn from this article: There are so many moving parts related to Active Directory (AD). So, it is important to know how to monitor, report, fix and diagnose issues related to the
Comparison of Active Directory and Windows NT
Difference between Active Directory and Windows NT What you will learn: Windows NT and Active Directory, at the core, are network operating systems (NOS) developed by Microsoft for centralized management of network devices. Active Directory
What is Global Catalog Server in Active Directory?
What you will learn from this article: An Active Directory network would be made of forests and domains. The domain controllers (DC) of a particular domain would contain all the information of the domain they
What is a Read Only Domain Controller (RODC)
Introduction A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in
Active Directory Replication: What it is and how it works
What you will learn from this article? Information in the Active Directory (AD) network is modified or updated constantly. In such cases, if any information is updated in one domain controller (DC) of the AD
What is Azure Active Directory?
Azure Active Directory: Introduction Azure Active Directory is a multi-tenant, cloud-based directory and identity management service provided by Microsoft. It offers identity and access capabilities for applications running in both Microsoft Azure and in an
Securing administrator accounts in Active Directory
Administrator accounts are the most critical and powerful accounts in operating systems, devices, and Active Directory. Administrator accounts have complete access to all the files, domains, and services on a local server. They are used
Before migrating to Active Directory Domain Services (AD DS) 2022
In today’s dynamic IT landscape, the need for organizations to be agile and adaptable is more pronounced than ever. Active Directory Domain Services (AD DS) stands as the cornerstone of organizational identity. While the allure
How to raise AD forest functional level
What are Functional Levels? An Active Directory functional level determines what capabilities of Active Directory Domain Services (AD DS) are available for a particular forest or domain. The functional levels are specified in terms of
Group Policy Backup
What you will learn: Group policies are critical pieces of instructions in an Active Directory environment used to configure a variety of advanced settings that can be applied to objects in the network. A set
Active Directory Objects List
What are objects in Active Directory? Objects in Active Directory (AD) are entities that represent resources that are present in the AD network. These resources can be users, computers, printers, contact persons who may be
What are Domain Controllers?
What are Domain Controllers (DC)? The computer machines that function as servers in the domain can either be a member server or a DC. A member server belongs to a particular domain, but it does
Active Directory Schema: An overview into Schema Extension
Active Directory (AD) schema is a blueprint that describes the rules about the type of objects that can be stored in the AD as well as the attributes related to these objects. The schema thus
Active Directory Recycle Bin
What is Active Directory Recycle Bin? The Active Directory Recycle Bin feature allows administrators to restore deleted AD objects. In Active Directory, objects such as users, computers, groups, or organizational units may be unintentionally removed.
Active Directory Groups: An explanation
What are Active Directory groups? Active Directory is a Microsoft technology that is used to implement directory services. It is a feature of the Windows Server and one of the most popular on-premise directory services,
How to change the NTFS and share permissions
New Technology File System (NTFS) is the standard file management system provided by Microsoft. Access to any data stored in the NTFS is governed by NTFS permissions. Share permissions govern access to folders shared over a network. It’s not possible to modify permissions for the subfolders or objects in a particular share because these permissions are commonly applied to all its files and folders. Watch this video where we show how you can change the NTFS and share permissions.
Check out a more detailed explanation in our article here 👇
https://www.windows-active-directory.com/managing-shared-resources.html
For more such articles on managing shared resources, visit our website 👇
https://www.windows-active-directory.com/
To stay updated about industry trends and Active Directory best practices, subscribe to our monthly newsletter👇
https://www.manageengine.com/active-directory-360/iamroundup-newsletter.html
#NTFS #shared #windows #activedirectory
Configure domain password policy – Here’s how
In this article, we delve into configuring the Active Directory Domain password policy, essential for maintaining robust security and compliance within your organization. The following steps, inspired by user interactions and common queries, aim to
Active Directory Users and Computers (ADUC) – An introduction and installation guide
Active Directory Users and Computers (ADUC) is a common tool used by administrators to carry out daily tasks and much more in Active Directory AD. Some of the tasks an administrator can perform with the
User authentication and user authorization process: An explanation
What you’ll learn: Active Directory authentication and authorization are security processes. These processes are necessary in any environment so that the resources of an environment are not misused by anyone. In this article, we will
Trusts in Active Directory: An overview
What you will learn from this article: An Active Directory network may contain several domains in a hierarchical fashion. All the resources of one domain are not directly available to every other domain. The availability
The structures and benefits of organizational units
Organizational units (OUs) When you deploy Active Directory (AD) in your company, you may decide to create multiple organizational units (OUs) within your domain. An OU is a container within your domain that holds users,
Read only domain controller
Introduction A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in
Migrating AD from Windows Server 2003 to Windows Server 2016
Active Directory (AD), a service provided by Microsoft, functions as a central database for securely storing and managing information about user accounts, groups, applications, and other critical resources. It primarily functions as a directory service
How to transfer FSMO roles
What is FSMO? A flexible single-master operation (FSMO) is a set of AD (Active Directory) operations or roles designed to help eliminate replication conflicts. FSMO is used when standard data transfer and update methods are
Find a user’s last logon time
Ensuring the security and maintenance of Active Directory user accounts is a critical aspect of system administration. One key piece of information is the last logon time for a user, which helps administrators identify inactive
Active Directory Users and Computers (ADUC) – Part II
In part I of Active Directory Users and Computers, we introduced the Active Directory Users and Computers (ADUC) snap-in. We also saw a list of tasks an administrator can perform from the ADUC console and described
Benefits of Active Directory
What is Active Directory Active Directory (AD) is a directory service provided by Microsoft designed for Windows domain networks to organize and manage users, attributes, memberships, accounts, and more. It offers centralized authorization and authentication
Framework of Active Directory
The Active Directory structure is built on the domain level. The framework that holds the objects can be viewed at different levels namely forest, domain trees and domains. At the top of the level is
What are Domain Functional Levels and how do you raise them?
Domain Functional Levels – An overview Domain functional level (DFL) determines the features of a Domain Controller (DC) based on the Windows Server Operating System (OS) it runs on. A feature set of a particular
Microsoft Passport
Introduction Using passwords is a common approach to protecting and securing a resource from unauthorized access. However, the use and maintenance of passwords have their shortcomings. One challenge is the difficulty of remembering passwords, more so,
Integrating AD with LDAP
Introduction Active Directory (AD) is a directory service that stores information about objects on the network in a logical and hierarchical manner. Administrators control and manage access to network resources based on the permissions assigned
How to seize FSMO roles
It is a reasonably simple operation to move one or more FSMO roles from one Domain Controller to another. However, given that all DCs are functioning properly and are online. Learn more about FSMO roles
How to create a task via WMI
Creating a task via Windows Management Instrumentation (WMI) involves a series of steps that leverage WMI’s powerful framework for managing Windows-based systems. This article is intended for system administrators and technical professionals who are familiar
Hyper-V Virtualization: An explanation
What you will learn from this article: There are many scenarios where something would need to be tested on a server or a computer machine. In such scenarios, instead of using a physical test machine,
An Introduction to Lightweight Directory Access Protocol (LDAP)
What is LDAP? The Lightweight Directory Access Protocol, commonly known as LDAP, is a communication protocol used to access directory servers. In other words, LDAP is used to store, update and retrieve data from a
Active Directory Nested Groups Explained
What you will learn: Nesting groups in Active Directory (AD) allow for better control in managing access to resources in the AD network. Group nesting also makes it easier to assign permissions across multiple domains
What is a workgroup and how is it set up?
Authenticating users in a computer network. Employees in any organization, big or small, need to log in to their computers at the start of their work day. Logging in gives them access to shared files,
Active Directory Certificate Services
What you will learn from this article Before we delve into the Active Directory Certificate Services, let us understand certificates. A digital certificate and a traditional certificate have quite a few similarities. The certificates contain
Managing shared resources
Introduction When sharing resources in a common network, the biggest concern is delegating access levels to those resources. Permissions management is a critical security process since any pitfalls can make the organizations prone to data
Active Directory LDAP Field – Attribute Mappings
While accessing Active Directory users and computers (ADUC), it can be observed that Microsoft has used user-friendly names for the input fields. These fields are mapped to the LDAP (Lightweight Directory Access Protocol) attributes. You
WMI classes and categories
Listing every class in Windows Management Instrumentation (WMI) would be extensive, as WMI includes hundreds of classes that cover a wide range of functionalities. However, I can guide you on how to find a comprehensive