Active Directory Videos

How to view and modify object permissions | How to Active Directory

Users in an Active Directory (AD) network can gain access to resources of the network, whether they are files and folders, or computers and printers. However, not all users need access to all the resources of the network. In this video, we will take a look at what AD permissions are, permission inheritance to child objects, and dive into how to view and modify permissions in AD. Check out a more…
Read more
Recent AD News

Another zero-day vulnerability confirmed by Microsoft

This vulnerability, present in the Windows Print Spooler service, allows local attackers to get access to system privileges. Microsoft has confirmed another Windows Print Spooler vulnerability, that is being tracked as CVE-2021-36958. This vulnerability, which is a part of the PrintNightmare set of vulnerabilities, allows the local attackers to gain access to system privileges. Microsoft…
Read more
Active Directory Videos

How to raise your forest functional level | How to Active Directory

In this video tutorial, we will discuss how to raise Active directory forest functional level in windows server 2012R2 to 2016 by using Active Directory Users and Computers console and Active Directory Domain and Trust console. For a more detailed explanation, check out our article here 👇 https://www.windows-active-directory.com/forest-functional-level.html For more such articles on Windows…
Read more
Active Directory Videos

How to raise your domain functional level | How to Active Directory

In this step-by-step video tutorial we discuss how you can raise your domain functional level from 2012R2 to 2016 by using the Active Directory Domain and Trust console. For a more detailed explanation, check out our article here 👇 https://www.windows-active-directory.com/domain-functional-level.html For more such articles on Windows Server Management, visit our website…
Read more
Active Directory Videos

How to locate an AD object | How to Active Directory

Manually digging through thousands of users, groups, and computers to find the required objects can be quite time-consuming. In this explainer video, we’ll look into how AD objects can be located using the command line and the Active Directory Users and Computers console. Check out a more detailed explanation in our article here…
Read more
Active Directory Videos

How to edit AD Account Lockout Policies | How to Active Directory

An account lockout policy is a built-in security policy that allows administrators to determine when and for how long a user account should be locked out. It determines what happens when a user enters the wrong password. In this video, we will learn how we can change the account lockout group policy in Windows Server 2012 Active Directory. Check out a more detailed explanation in our article here…
Read more
Active Directory Videos

How to edit AD Password Policies | How to Active Directory

To ensure a high level of security for user accounts in the Active Directory domain, an administrator must configure and implement a password policy that provides sufficient complexity, password length, and the frequency of changing user and service account passwords. Learn how to change the default password policy on Windows Server 2012. Check out a more detailed explanation in our article here…
Read more
Active Directory Fundamentals

Active Directory Groups: An explanation

What are Active Directory groups? Active Directory is a Microsoft technology that is used to implement directory services. It is a feature of the Windows Server and one of the most popular on-premise directory services, which provides functionalities to store and handle directory information. A collection of Active Directory objects is called an Active Directory Group. They may include users…
Read more
Webinars

Top 5 IAM challenges of 2021 and how to overcome them

Why attend this webinar? According to predictions made by Gartner and Forrester on IT management trends post-COVID-19, managing identities could get more challenging in 2021. Unprecedented disruptions caused by the pandemic forced organizations to prioritize service availability over security. As a result, many organizations have inadvertently paved the way for cybercriminals to exploit…
Read more