Active Directory FundamentalsRecent Posts

Hyper-V Virtualization: An explanation

What you will learn from this article: There are many scenarios where something would need to be tested on a server or a computer machine. In such scenarios, instead of using a physical test machine, it would be better to use a virtual representation of a target machine, so that should anything go wrong, this ‘virtual machine’ can be shut down without affecting the real machine.
Read more
Active Directory FundamentalsRecent Posts

Active Directory Users and Computers (ADUC) – Part II

In part Iof Active Directory Users and Computers, we introduced the Active Directory Users and Computers (ADUC) snap-in. We also saw a list of tasks an administrator can perform from the ADUC console and described how to perform a few basic tasks. In this part, we will look at some Active Directory advanced features that will come in handy for an administrator managing users…
Read more
Active Directory FundamentalsRecent PostsTop Read Articles

Active Directory Users and Computers (ADUC) - An introduction and installation guide

Active Directory Users and Computers (ADUC) is a common tool used by administrators to carry out daily tasks and much more in Active Directory AD. Some of the tasks an administrator can perform with the help of this MMC snap-in are as follows: Create and manage AD objects, such as users, computers, groups, and contacts, along with their attributes. Create Organizational Units (OU), move…
Read more
Hand-picked Resources

NIST and HIPAA compliance: Remediate risks, address compliance gaps, and ensure PHI integrity

As healthcare organizations adopt new technologies, they need to ensure compliance with the Health Insurance Portability and Accountability Act (HIPAA). However, one drawback of HIPAA is that the clauses can be very abstract and can leave a lot of room for interpretation. To help healthcare organizations covered by HIPAA bolster their security posture, the Office for Civil Rights released a…
Read more
Hand-picked Resources

Remote data security best practices

With employees in organizations around the world working from home, attackers are taking advantage of the situation. Your network has in fact become more vulnerable with an increase in remote traffic flowing in. To add to it, insider threats are on the rise with rogue employees going unchecked in the comfort of their home. Download this e-book to learn the top 5 industry best practices that…
Read more
Active Directory PoliciesEditor's Pick

Managing GPOs with Group Policy Management Console

Group Policy Management Console: An Introduction The Group Policy Management Console (GPMC) is a one-stop solution for performing all the Group Policy functions an administrator has to deal with. This MMC snap-in provides all the information about Group Policies and allows one to view all the settings within a Group Policy Object (GPO). Many of the functions of the GPMC can also be scripted.
Read more
Editor's Pick

Group Policy Management Console (GPMC) – Part II

In part I  of Group Policy Management Console (GPMC), we introduced the GPMC MMC snap-in, its functionalities and also looked at how to perform a few basic tasks. In this part we will look at some of the other tasks that can be executed from the console. Linking a GPO In the GPMC, locate the domain or OU to which the GPO is to be linked and right click.To link an existing GPO, select the…
Read more
Active Directory FundamentalsTop Read Articles

Group Policy Backup

What you will learn: Group policies are critical pieces of instructions in an Active Directory environment used to configure a variety of advanced settings that can be applied to objects in the network. A set of Group Policy configurations are bundled as Group Policy Objects (GPO) which can then be applied to objects. IT administrators take weeks and months to create GPOs that are customized to…
Read more
Active Directory FundamentalsTop Read Articles

Active Directory Maintenance Checklist

What you will learn from this article: There are so many moving parts related to Active Directory (AD). So, it is important to know how to monitor, report, fix and diagnose issues related to the different supporting technologies. Identifying bottlenecks and resolving them before they cause much harm improves productivity, ensures efficient usage of resources, maintains consistency in data and…
Read more