Active Directory Fundamentals

What are Domain Functional Levels and how do you raise them?

Domain Functional Levels – An overview Domain functional level (DFL) determines the features of a Domain Controller (DC) based on the Windows Server Operating System (OS) it runs on. A feature set of a particular DFL will be available for a DC if it runs on the operating system version that is compatible with the functional level. Note that, the OS version constraint is only for the…
Read more
Active Directory Fundamentals

The structures and benefits of organizational units

Organizational units (OUs) When you deploy Active Directory (AD) in your company, you may decide to create multiple organizational units (OUs) within your domain. An OU is a container within your domain that holds users, groups, computers, and other objects. You use an OU to store similar objects, making them easy to access and administer them. An OU will always be contained within a single…
Read more
Active Directory Fundamentals

Active Directory Schema: An overview into Schema Extension

Active Directory (AD) schema is a blueprint that describes the rules about the type of objects that can be stored in the AD as well as the attributes related to these objects. The schema thus defines the content, and the structure of the object classes, and theobject attributes used to create an object. While creating a new object, the AD references the classes defined in the schema and…
Read more
Active Directory Fundamentals

What is a Read Only Domain Controller (RODC)

Introduction A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in its succeeding versions. Enterprises tend to deploy RODC under two conditions viz., When there is not enough physical security to the datacenter. When there…
Read more
Active Directory Fundamentals

Active Directory Subnets, Sites, and Site links

Active Directory Subnets A single, physical network can be broken into smaller segments called subnets in a process called subnetting. Each subnet on a network is connected by routers. Every device in a network, whether it’s a domain controller (DC), a server, or a client, must belong to a particular subnet. By using subnets, an organization won’t need to acquire a new network number…
Read more
Active Directory Objects

Active Directory User properties – General tab

In IT infrastructures, Active Directory (AD) plays a vital role in auditing and managing user accounts, groups, and permissions. AD groups streamline auditing, management, and permissions for users. The General tab of an AD group object encompasses essential features for effective management, making it crucial for administrators to understand its significance. This blog explores the importance and…
Read more
Active Directory Fundamentals

Creating objects in active directory

You can create objects in Active Directory by using the Active directory users and computers console. Start -> Administrators tools -> Active Directory users and computers. On the Active Directory users and computers console, right click on the container object within which you would like to create an object. A submenu pops out , from that choose the option new. On choosing the…
Read more
Active Directory Fundamentals

Active Directory objects: All you need to know

What you’ll learn: Active Directory (AD) is a directory service introduced by Microsoft as a centralized network resource management system. This network is comprised of entities that represent real users or network resources, and the entities are called Active Directory objects. AD objects can be of several types based on what they represent and their function. In this article, we shall…
Read more
Recent AD News

2020 recorded the highest number of CVE’s to ever be reported

In an analysis carried out by the National Institute of Standards and Technology (NIST) on common vulnerabilities and exposures, it has been found that 2020 holds the record for the highest reports of security loopholes than any other year to date. The report shows that, in the year 2020 alone, as much as 18,103 vulnerabilities were reported with almost 10,342 of them classified as high or…
Read more