Group Policy Backup

What you will learn: Group policies are critical pieces of instructions in an Active Directory environment used to configure a variety of advanced settings that can be applied to objects in the network. A set

Read More »

What is Active Directory?

Large organizations depend on Windows Active Directory (AD) to maintain order in the chaos that is managing users, computers, permissions, and file servers. The sheer number of articles available on the internet can disconcert beginners and

Read More »

Active Directory Objects List

What are objects in Active Directory? Objects in Active Directory (AD) are entities that represent resources that are present in the AD network. These resources can be users, computers, printers, contact persons who may be

Read More »

Benefits of Active Directory

What is Active Directory Active Directory (AD) is a directory service provided by Microsoft designed for Windows domain networks to organize and manage users, attributes, memberships, accounts, and more. It offers centralized authorization and authentication

Read More »

DNS and Active Directory

Domain Name System (DNS) is a name resolution method that is used to resolve host names to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a namespace. Active Directory

Read More »

Active Directory FSMO Roles Explained

What you will learn from this article: Active Directory (AD) relies on the AD replication process to keep the information updated across all its domain controllers (DC) in the network. This replication is done through

Read More »

What are Domain Controllers?

 What are Domain Controllers (DC)?  The computer machines that function as servers in the domain can either be a member server or a DC. A member server belongs to a particular domain, but it does

Read More »

Trusts in Active Directory: An overview

What you will learn from this article: An Active Directory network may contain several domains in a hierarchical fashion. All the resources of one domain are not directly available to every other domain. The availability

Read More »

Framework of Active Directory

The Active Directory structure is built on the domain level. The framework that holds the objects can be viewed at different levels namely forest, domain trees and domains. At the top of the level is

Read More »

Creating objects in active directory

You can create objects in Active Directory by using the Active directory users and computers console. Start -> Administrators tools -> Active Directory users and computers. On the Active Directory users and computers console, right click

Read More »

Understanding Active Directory Tombstone

 What are Tombstones in Active Directory?  When you delete an object from the Active Directory (AD) database, it’s marked as a tombstone object instead of being fully removed. By default, each tombstone object remains in

Read More »

Active Directory Recycle Bin 

What is Active Directory Recycle Bin?  The Active Directory Recycle Bin feature allows administrators to restore deleted AD objects. In Active Directory, objects such as users, computers, groups, or organizational units may be unintentionally removed.

Read More »

Read only domain controller

Introduction A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in

Read More »

Microsoft Passport

Introduction Using passwords is a common approach to protecting and securing a resource from unauthorized access. However, the use and maintenance of passwords have their shortcomings. One challenge is the difficulty of remembering passwords, more so,

Read More »

Active Directory Certificate Services

What you will learn from this article Before we delve into the Active Directory Certificate Services, let us understand certificates. A digital certificate and a traditional certificate have quite a few similarities. The certificates contain

Read More »

Microsoft Hello

For quite a long time, we have been following the routine of typing in a password for accessing our computers. Strong password requirements make us set complex passwords which we often tend to forget, and then

Read More »

DNS and Active Directory

What is AD DNS? Domain Name System (DNS) is a name resolution method that is used to resolve hostnames to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a

Read More »

What is Azure Active Directory?

Azure Active Directory: Introduction Azure Active Directory is a multi-tenant, cloud-based directory and identity management service provided by Microsoft. It offers identity and access capabilities for applications running in both Microsoft Azure and in an

Read More »

  Integrating AD with LDAP 

Introduction  Active Directory (AD) is a directory service that stores information about objects on the network in a logical and hierarchical manner. Administrators control and manage access to network resources based on the permissions assigned

Read More »

Managing shared resources

Introduction When sharing resources in a common network, the biggest concern is delegating access levels to those resources. Permissions management is a critical security process since any pitfalls can make the organizations prone to data

Read More »

The OSI model: What it is and how you can use it

Developed by the International Organization for Standardization (ISO) in 1984 when network computing was at its nascent stage, the Open Systems Interconnection (OSI) model is the visual representation of how information interacts with different mediums—hardware

Read More »

How to change the NTFS and share permissions

New Technology File System (NTFS) is the standard file management system provided by Microsoft. Access to any data stored in the NTFS is governed by NTFS permissions. Share permissions govern access to folders shared over a network. It’s not possible to modify permissions for the subfolders or objects in a particular share because these permissions are commonly applied to all its files and folders. Watch this video where we show how you can change the NTFS and share permissions.

Check out a more detailed explanation in our article here 👇
https://www.windows-active-directory.com/managing-shared-resources.html

For more such articles on managing shared resources, visit our website 👇
https://www.windows-active-directory.com/

To stay updated about industry trends and Active Directory best practices, subscribe to our monthly newsletter👇
https://www.manageengine.com/active-directory-360/iamroundup-newsletter.html

#NTFS #shared #windows #activedirectory

Read More »

How to transfer FSMO roles

What is FSMO? A flexible single-master operation (FSMO) is a set of AD (Active Directory) operations or roles designed to help eliminate replication conflicts. FSMO is used when standard data transfer and update methods are

Read More »

How to seize FSMO roles

It is a reasonably simple operation to move one or more FSMO roles from one Domain Controller to another. However, given that all DCs are functioning properly and are online. Learn more about FSMO roles

Read More »

Find a user’s last logon time

Ensuring the security and maintenance of Active Directory user accounts is a critical aspect of system administration. One key piece of information is the last logon time for a user, which helps administrators identify inactive

Read More »

How to create a task via WMI

Creating a task via Windows Management Instrumentation (WMI) involves a series of steps that leverage WMI’s powerful framework for managing Windows-based systems. This article is intended for system administrators and technical professionals who are familiar

Read More »

WMI classes and categories

Listing every class in Windows Management Instrumentation (WMI) would be extensive, as WMI includes hundreds of classes that cover a wide range of functionalities. However, I can guide you on how to find a comprehensive

Read More »

How to create a process via WMI remotely

Creating a Remote Process via Windows Management Instrumentation (WMI) In the realm of system administration, the ability to remotely manage and automate tasks on Windows machines is crucial. This article provides a detailed guide on

Read More »

How to schedule a process remotely via WMI

Remote task scheduling is a critical competency for system administrators managing a network of Windows machines. This article provides a comprehensive guide on how to schedule a process remotely using Windows Management Instrumentation (WMI), without

Read More »

How to raise AD forest functional level

What are Functional Levels? An Active Directory functional level determines what capabilities of Active Directory Domain Services (AD DS) are available for a particular forest or domain. The functional levels are specified in terms of

Read More »

Leveraging AD improvements for hybrid cloud usage

  Hybrid identity is rarely “cloud identity plus legacy AD.” In most enterprises, Active Directory (AD DS) remains the authoritative source for many user and computer identities, authentication policies, and operational workflows—while cloud services depend

Read More »

Principles from Microsoft AD hardening series

Principles from Microsoft’s Active Directory Hardening Guidance Microsoft has published years of Active Directory (AD) security guidance across documents, reference architectures, “security hardening” checklists, and the broader identity security model used for Windows, Entra ID,

Read More »

How to handle user SID-related tasks

Handling user SID-related tasks: from first principles to field-tested operations Security identifiers (SIDs) are the nucleus of identity and authorization in Windows and Active Directory. Every access check, every token, every ACL decision hinges on

Read More »

Restricting logon to specific machines

  Restricting logon to specific machines means enforcing which Windows computers a given user may sign in to—locally or via Remote Desktop—using Active Directory controls such as userWorkstations (“Log On To…”) and computer-side User Rights

Read More »

Auditing failed logons and lockouts

<!doctype html> Failed logons and account lockouts are the earliest, loudest signals of identity trouble in a Windows environment. Sometimes that trouble is harmless (a user typing the wrong password). Sometimes it is operational debt

Read More »

Hwo to implement LAPS for local accounts

<!doctype html> Local administrator accounts are both necessary and dangerous. They are the “break glass” lever for offline recovery and deep troubleshooting, but they also create one of the most reliable paths for lateral movement

Read More »

Assign home folders dynamically with scripts

A user home folder sounds simple: “give each person a private network location and map it as H:”. In real environments, that “simple” choice becomes a long-running system: identity meets storage, permissions, audits, migrations, quotas,

Read More »

Risk-based lockout policy tuning

  Risk-based lockout policy tuning is the practice of adjusting lockout behavior based on the assessed risk of an authentication attempt, rather than relying on a fixed “X failed passwords = lockout” rule. The goal

Read More »

Aging analysis of user accounts

Aging Analysis of User Accounts A first-principles approach to reducing access risk, cleaning identity sprawl, and improving audit readiness. What “aging analysis” means: Aging analysis is the practice of classifying user accounts by time-based signals

Read More »