DNS and Active Directory

Domain Name System (DNS) is a name resolution method that is used to resolve host names to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a namespace. Active Directory

Read More »

Microsoft Hello

For quite a long time, we have been following the routine of typing in a password for accessing our computers. Strong password requirements make us set complex passwords which we often tend to forget, and then

Read More »

The OSI model: What it is and how you can use it

Developed by the International Organization for Standardization (ISO) in 1984 when network computing was at its nascent stage, the Open Systems Interconnection (OSI) model is the visual representation of how information interacts with different mediums—hardware

Read More »

How to create a process via WMI remotely

Creating a Remote Process via Windows Management Instrumentation (WMI) In the realm of system administration, the ability to remotely manage and automate tasks on Windows machines is crucial. This article provides a detailed guide on

Read More »

Creating objects in active directory

You can create objects in Active Directory by using the Active directory users and computers console. Start -> Administrators tools -> Active Directory users and computers. On the Active Directory users and computers console, right click

Read More »

DNS and Active Directory

What is AD DNS? Domain Name System (DNS) is a name resolution method that is used to resolve hostnames to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a

Read More »

How to schedule a process remotely via WMI

Remote task scheduling is a critical competency for system administrators managing a network of Windows machines. This article provides a comprehensive guide on how to schedule a process remotely using Windows Management Instrumentation (WMI), without

Read More »

What is Active Directory?

Large organizations depend on Windows Active Directory (AD) to maintain order in the chaos that is managing users, computers, permissions, and file servers. The sheer number of articles available on the internet can disconcert beginners and

Read More »

Active Directory FSMO Roles Explained

What you will learn from this article: Active Directory (AD) relies on the AD replication process to keep the information updated across all its domain controllers (DC) in the network. This replication is done through

Read More »

Understanding Active Directory Tombstone

 What are Tombstones in Active Directory?  When you delete an object from the Active Directory (AD) database, it’s marked as a tombstone object instead of being fully removed. By default, each tombstone object remains in

Read More »

What is Azure Active Directory?

Azure Active Directory: Introduction Azure Active Directory is a multi-tenant, cloud-based directory and identity management service provided by Microsoft. It offers identity and access capabilities for applications running in both Microsoft Azure and in an

Read More »

How to raise AD forest functional level

What are Functional Levels? An Active Directory functional level determines what capabilities of Active Directory Domain Services (AD DS) are available for a particular forest or domain. The functional levels are specified in terms of

Read More »

Group Policy Backup

What you will learn: Group policies are critical pieces of instructions in an Active Directory environment used to configure a variety of advanced settings that can be applied to objects in the network. A set

Read More »

Active Directory Objects List

What are objects in Active Directory? Objects in Active Directory (AD) are entities that represent resources that are present in the AD network. These resources can be users, computers, printers, contact persons who may be

Read More »

What are Domain Controllers?

 What are Domain Controllers (DC)?  The computer machines that function as servers in the domain can either be a member server or a DC. A member server belongs to a particular domain, but it does

Read More »

Active Directory Recycle Bin 

What is Active Directory Recycle Bin?  The Active Directory Recycle Bin feature allows administrators to restore deleted AD objects. In Active Directory, objects such as users, computers, groups, or organizational units may be unintentionally removed.

Read More »

How to change the NTFS and share permissions

New Technology File System (NTFS) is the standard file management system provided by Microsoft. Access to any data stored in the NTFS is governed by NTFS permissions. Share permissions govern access to folders shared over a network. It’s not possible to modify permissions for the subfolders or objects in a particular share because these permissions are commonly applied to all its files and folders. Watch this video where we show how you can change the NTFS and share permissions.

Check out a more detailed explanation in our article here 👇
https://www.windows-active-directory.com/managing-shared-resources.html

For more such articles on managing shared resources, visit our website 👇
https://www.windows-active-directory.com/

To stay updated about industry trends and Active Directory best practices, subscribe to our monthly newsletter👇
https://www.manageengine.com/active-directory-360/iamroundup-newsletter.html

#NTFS #shared #windows #activedirectory

Read More »

Trusts in Active Directory: An overview

What you will learn from this article: An Active Directory network may contain several domains in a hierarchical fashion. All the resources of one domain are not directly available to every other domain. The availability

Read More »

Read only domain controller

Introduction A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in

Read More »

How to transfer FSMO roles

What is FSMO? A flexible single-master operation (FSMO) is a set of AD (Active Directory) operations or roles designed to help eliminate replication conflicts. FSMO is used when standard data transfer and update methods are

Read More »

Find a user’s last logon time

Ensuring the security and maintenance of Active Directory user accounts is a critical aspect of system administration. One key piece of information is the last logon time for a user, which helps administrators identify inactive

Read More »

Benefits of Active Directory

The benefits of Active directory usage are manifold. It makes the task of network administration simpler by maintaining a central repository of information. It provides Off-Site a single destination to look out for information. Highly secured access

Read More »

Framework of Active Directory

The Active Directory structure is built on the domain level. The framework that holds the objects can be viewed at different levels namely forest, domain trees and domains. At the top of the level is

Read More »

Microsoft Passport

Introduction Using passwords is a common approach to protecting and securing a resource from unauthorized access. However, the use and maintenance of passwords have their shortcomings. One challenge is the difficulty of remembering passwords, more so,

Read More »

  Integrating AD with LDAP 

Introduction  Active Directory (AD) is a directory service that stores information about objects on the network in a logical and hierarchical manner. Administrators control and manage access to network resources based on the permissions assigned

Read More »

How to seize FSMO roles

It is a reasonably simple operation to move one or more FSMO roles from one Domain Controller to another. However, given that all DCs are functioning properly and are online. Learn more about FSMO roles

Read More »

How to create a task via WMI

Creating a task via Windows Management Instrumentation (WMI) involves a series of steps that leverage WMI’s powerful framework for managing Windows-based systems. This article is intended for system administrators and technical professionals who are familiar

Read More »

Active Directory Certificate Services

What you will learn from this article Before we delve into the Active Directory Certificate Services, let us understand certificates. A digital certificate and a traditional certificate have quite a few similarities. The certificates contain

Read More »

Managing shared resources

Introduction When sharing resources in a common network, the biggest concern is delegating access levels to those resources. Permissions management is a critical security process since any pitfalls can make the organizations prone to data

Read More »

WMI classes and categories

Listing every class in Windows Management Instrumentation (WMI) would be extensive, as WMI includes hundreds of classes that cover a wide range of functionalities. However, I can guide you on how to find a comprehensive

Read More »