Microsoft Entra IDTenant & Directory Administration

How groups work in Azure AD

The straightforward way to provide users with resources is directly assigning the relevant resources to a user, but doing this for hundreds and thousands of users can be quite taxing. This is where the concept of Groups enters the fray in Azure Active Directory (Azure AD). Groups are a way of assigning resources to users, only this time, users are added to a group and the group is allotted with…
Read more
Microsoft Entra IDTenant & Directory Administration

How access management works in Azure AD

The process of authenticating, authorising, and auditing access to IT systems, applications and services is known as access management. Access management is usually coupled with identity management resulting in identity and access management (IAM).Via rigid and strong control over access from on-premises to cloud-based services and infrastructure, access management aids with enhancing security and…
Read more
AD Domain ServicesAuthentication & Protocols

Active Directory LDAP Field - Attribute Mappings   

While accessing Active Directory users and computers (ADUC), it can be observed that Microsoft has used user-friendly names for the input fields. These fields are mapped to the LDAP (Lightweight Directory Access Protocol) attributes. You can access the hidden tab within the ADUC which will list all the attributes and their respective values. The reason for understanding and learning about these…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

Desktop shortcuts using AD Group Policy: The complete guide

Active Directory (AD) Group Policy Objects (GPOs) are used to centrally manage user account settings, system configurations, and access to network resources. Here are some of the important benefits of using GPOs to configure shortcuts on user desktops: Deploy shortcuts to apps, links, file objects, and shell objects.Target specific user systems based on IP address range, MAC address range…
Read more
Microsoft Entra IDTenant & Directory Administration

How to deploy Domain Controller in Azure Active Directory?

There are a number of features that are unique to Azure AD Domain Services that provide full compatibility with Windows Server Active Directory, including domain joining, group policy, LDAP, Kerberos/NTLM authentication, and group management. Let us look into how to deploy domain controller in Azure AD. These domain services allow you to consume them without having to deploy, manage, and patch…
Read more
AD Domain ServicesReplication, Sites & Domain Controllers

How to demote a Domain Controller: A step-by-step guide

Are you a Windows system administrator looking for how to demote Domain Controller in your Active Directory? You have landed on the right place.There are many reasons to demote a Domain Controller. For example, if a server is needed to be a member of a standalone server or if it needs to be migrated to another domain, demotion of Domain Controller is required to be performed…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

HOW TO DEPLOY EXE FILES USING GPO

Group Policy is an hierarchical infrastructure in Microsoft’s Active Directory which provides a centralized means for a network or system administrators to configure Windows servers and desktops. A virtual collection of policies constitute a Group Policy Object (GPO) and it is always identified by a Globally Unique Identifier (GUID). For a selected scope of management (SOM), the group…
Read more
Identity News & UpdatesNews & Updates

Chinese hacker group 'Naikon' strikes again: Targets ASEAN nations

According to researchers, the China-backed APT named Naikon (also known as ‘Override Panda’) has shown up again. The group masterminded a recent phishing campaign that was carried out to steal confidential information assets. Also known as Hellsing, and Bronze Geneva, Naikon is a known nation-state actor that has been working on behalf of China since 2005. The group was first…
Read more
AD Domain ServicesArchitecture & Design

Report breaches to CERT-In within six hours: Indian government's order to organizations

On April 28, the Indian government’s Computer Emergency Response Team (CERT-In), the cyber response wing of Ministry of Electronics and IT (MeitY), issued a fresh order directing organizations (including service providers, intermediaries, data centers and corporate bodies) to report major security incidents, within six hours after notice. In a move to improve incident response, protect…
Read more