AD objects can be of several types based on what they represent and their function. In this video, we shall understand what AD objects are, learn about the different types of objects in AD, and see how the objects can be created, modified, and deleted.
Check out a more detailed explanation in our article here…
Users in an Active Directory (AD) network can gain access to resources of the network, whether they are files and folders, or computers and printers. However, not all users need access to all the resources of the network. In this video, we will take a look at what AD permissions are, permission inheritance to child objects, and dive into how to view and modify permissions in AD.
Check out a more…
Another zero-day vulnerability confirmed by Microsoft
August 17, 2021
This vulnerability, present in the Windows Print Spooler service, allows local attackers to get access to system privileges.
Microsoft has confirmed another Windows Print Spooler vulnerability, that is being tracked as CVE-2021-36958. This vulnerability, which is a part of the PrintNightmare set of vulnerabilities, allows the local attackers to gain access to system privileges.
Microsoft…
In this video tutorial, we will discuss how to raise Active directory forest functional level in windows server 2012R2 to 2016 by using Active Directory Users and Computers console and Active Directory Domain and Trust console.
For a more detailed explanation, check out our article here 👇
https://www.windows-active-directory.com/forest-functional-level.html
For more such articles on Windows…
In this step-by-step video tutorial we discuss how you can raise your domain functional level from 2012R2 to 2016 by using the Active Directory Domain and Trust console.
For a more detailed explanation, check out our article here 👇
https://www.windows-active-directory.com/domain-functional-level.html
For more such articles on Windows Server Management, visit our website…
How to locate an AD object | How to Active Directory
August 17, 2021
Manually digging through thousands of users, groups, and computers to find the required objects can be quite time-consuming. In this explainer video, we’ll look into how AD objects can be located using the command line and the Active Directory Users and Computers console.
Check out a more detailed explanation in our article here…
An account lockout policy is a built-in security policy that allows administrators to determine when and for how long a user account should be locked out. It determines what happens when a user enters the wrong password. In this video, we will learn how we can change the account lockout group policy in Windows Server 2012 Active Directory.
Check out a more detailed explanation in our article here…
How to edit AD Password Policies | How to Active Directory
August 17, 2021
To ensure a high level of security for user accounts in the Active Directory domain, an administrator must configure and implement a password policy that provides sufficient complexity, password length, and the frequency of changing user and service account passwords. Learn how to change the default password policy on Windows Server 2012.
Check out a more detailed explanation in our article here…
Active Directory Groups: An explanation
August 12, 2021
What are Active Directory groups?
Active Directory is a Microsoft technology that is used to implement directory services. It is a feature of the Windows Server and one of the most popular on-premise directory services, which provides functionalities to store and handle directory information. A collection of Active Directory objects is called an Active Directory Group. They may include users…
Top 5 IAM challenges of 2021 and how to overcome them
August 12, 2021
Why attend this webinar?
According to predictions made by Gartner and Forrester on IT management trends post-COVID-19, managing identities could get more challenging in 2021.
Unprecedented disruptions caused by the pandemic forced organizations to prioritize service availability over security. As a result, many organizations have inadvertently paved the way for cybercriminals to exploit…