Windows Active Directory
  • Active Directory
    Report

    ManageEngine among notable vendors in Forrester’s report

    Insights and analysis from the latest Forrester landscape report.

    Read Report
    AD Domain Services
    • Architecture & Design
    • Directory Objects & Identity
    • Authentication & Protocols
    • Replication, Sites & DC
    • Operations & Troubleshooting
    • Security Hardening
    • DNS & Name Resolution
    • AD Certificate Services & PKI
    Group/EndPoint Policy & Automation
    • Scripts & Templates
    • GPO Fundamentals
  • Security
    Security Strategy

    5 ways to mitigate the rising threat of identity sprawl

    Learn how to regain control over distributed identities and secure your perimeter.

    Read Article
    Security Ops for Identity
    • Attack Techniques & Threat Modeling
    • Detection Engineering
    • Incident Response Playbooks
    • Zero Trust for Identity
    News
    • Identity news & updates
  • Azure
    Hybrid Security

    6-step guide to Enhance Hybrid IT Security

    Implement CISA's recommendations to fortify your hybrid infrastructure.

    Read Guide
    Microsoft Entra ID
    • Tenant & Directory Administration
    • Authentication Methods
    • Identity Governance
    • Identity Protection & Risk
    • Conditional Access
    • External Identities
    Hybrid Id & Federation
    • AD Federation Services
    • Entra Connect/Cloud Sync
  • Toolkit
    Watch & Listen
    • AD - How to
    • On-Prem
    • Cloud
    • Podcast
    AD Tools
    • Management
    • Reporting
    • Security
    • Health
    Most Popular

    SysAdmin Toolkit

    The essential CLI pack for every admin. Free forever.

    Download Now
  • Resources
    E-books
    • Sysadmins survival guide for endpoint security
    • Saving IT from cybersecurity burnout
    • IT Admin's roadmap to Zero Trust
    • Automated User Provisioning in Healthcare
    Webinars
    • NIST CyberSecurity Framework
    • Prevent AD Password attacks
    • 5-step cyberseccurity strategy
    • AI's impact on Zero Trust
    Latest PDF

    Group Policy Guide

    Best practices for GPO precedence and troubleshooting.

    Read Ebook
Identitude
Site Search
Search for guides, tools, and tutorials.
Subscribe to get the latest updates straight to your inbox.
Please enter a valid business email.
Please select a country.
By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.
Menu
  • Active Directory
    Architecture & Design
Identitude Newsletter
Subscribe Free

Author

Arun Kumar

409 posts
AD Domain ServicesArchitecture & Design

Trust management: transitive vs external trusts

October 3, 2025
Trust management in Active Directory: transitive vs external trusts Trusts are where “directory design” turns into “security reality.” A single trust decision can either enable clean collaboration or quietly expand your blast radius across domains and forests. This guide focuses on the difference that matters most in…
Read more
AD Domain ServicesReplication, Sites & Domain Controllers

Secure admin enclaves: isolating DC administrative access

October 3, 2025
Secure admin enclaves: isolating DC administrative access If your Domain Controller admin credentials touch “normal” endpoints, assume they’ll eventually be stolen. Secure admin enclaves exist to make that theft dramatically harder—and to limit blast radius when something still goes wrong. What is a secure admin enclave? A secure admin…
Read more
AD Domain ServicesArchitecture & Design

Service account design in architecture (gMSAs etc.)

October 3, 2025
Service Account Design in Architecture (gMSAs, SPNs, Delegation, and Real-World Patterns) Service accounts are rarely “just accounts.” They’re long-lived identities that sit at the junction of authentication (Kerberos vs NTLM), authorization (AD ACLs), and operational reliability. That combination makes them both critical and dangerous: …
Read more
AD Domain ServicesArchitecture & Design

Forest/domain consolidation vs maintaining separation

October 3, 2025
Forest/Domain Consolidation vs Maintaining Separation (Active Directory) A comparison for Active Directory architecture decisions. In modern enterprises, Active Directory (AD) remains the backbone of identity and access management. As organizations expand through mergers, acquisitions, or organic growth, they often end up with multiple forests or…
Read more
AD Domain ServicesReplication, Sites & Domain Controllers

Site replication tuning and SRV record importance

October 3, 2025
Site Replication Tuning and SRV Record Importance: Why It Matters Active Directory (AD) relies on two critical mechanics to function smoothly across distributed environments: site replication tuning and SRV (Service) record management. Replication ensures domain controllers share consistent data, while SRV records in DNS help clients and…
Read more
AD Domain ServicesDirectory Objects & Identity Data

Global catalog placement for large enterprise sites

October 3, 2025
Global Catalog Placement for Large Enterprise Sites The Global Catalog (GC) in Active Directory (AD) is more than a simple directory service role. It is the index that lets users, applications, and domain controllers (DCs) quickly find what they need across an entire forest. If you need a refresher on what a GC is and how it behaves, see Global Catalog…
Read more
AD Domain ServicesArchitecture & Design

AD partition audit coverage: Domain, Configuration, Schema

October 3, 2025
AD Partition Audit Coverage: Domain, Configuration, Schema – The Foundational Guide Active Directory (AD) is built on directory partitions—logical containers that scope replication, management, and security. The three most critical partitions are Domain, Configuration, and Schema. Auditing these partitions matters because each one holds…
Read more
AD Domain ServicesAuthentication & Protocols

Delegation wizard: common use cases and pitfalls

October 3, 2025
Delegation wizard: common use cases and pitfalls The Delegation of Control Wizard in Active Directory Users and Computers (ADUC) looks deceptively simple: pick an OU, pick a group, tick a few boxes, and suddenly the helpdesk can do their jobs without Domain Admin. In real environments, though, delegation is where small mistakes turn into big…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

How to detect privileged group membership changes

October 3, 2025
Detecting privileged group membership changes Privileged group membership is one of the highest-leverage control points in Active Directory. If an attacker can add an account (or a computer, service principal, or nested group) to a privileged group, they often don’t need a “loud” exploit anymore—access becomes legitimate by definition.
Read more
AD Domain ServicesDirectory Objects & Identity Data

Understanding group nesting limits and token size

October 3, 2025
Understanding group nesting limits and token size Group nesting is one of Active Directory’s most powerful features: you can model roles and access using a few reusable groups, then compose them into higher-level “business” groups. The trap is that you’re not just building a tidy hierarchy—you’re also building a logon authorization…
Read more
Page 9 of 39« First«...7891011...2030...»Last »
  • Featured Posts

    • What is Azure Data Factory (ADF)? 

      April 10, 2023
    • How to demote a Domain Controller: A step-by-step guide

      August 22, 2022
    • Healthcare data Breaches down almost 50 percent in the first month of 2021

      March 3, 2021
  • Popular with Readers

    AD Domain ServicesDirectory Objects & Identity Data

    Active Directory Users and Computers (ADUC) - An introduction and installation guide

    February 4, 2021
    AD Domain ServicesArchitecture & Design

    Active Directory Sites

    February 4, 2021
    GPO FundamentalsGroup Policy & Endpoint Policy

    Active Directory Password Policy

    March 3, 2021
  • Recently Added

    • Secure guest access in Azure AD (Microsoft Entra id)

      March 3, 2026
    • Monitoring risky sign-ins with identity protection in entra id

      March 2, 2026
    • Entra conditional access templates for hybrid identity

      March 2, 2026

  • English
  • 日本語 (Japanese)