Active Directory Fundamentals

Microsoft Hello

For quite a long time, we have been following theroutine of typing in a password for accessing our computers. Strong password requirements make us set complex passwords which we often tend to forget, and then we frantically chase the administrator to reset our forgotten passwords. More importantly, even the most secure network is vulnerable to security breaches andthe network…
Read more
Active Directory Fundamentals

Active Directory Certificate Services

What you will learn from this article Before we delve into the Active Directory Certificate Services, let us understand certificates. A digital certificate and a traditional certificate have quite a few similarities. The certificates contain the issuing authority’s name. While a traditional certificate contains particulars of a university, organization, or government agency, the digital…
Read more
Active Directory Fundamentals

Microsoft Passport

Introduction Using passwords is a common approach to protecting and securing a resource from unauthorized access. However, the use and maintenance of passwords have their shortcomings. One challenge is the difficulty of remembering passwords, more so, if complex requirements are in place. Another possibility is the repository containing the passwords is being breached. Microsoft has an…
Read more
Active Directory Fundamentals

Read only domain controller

Introduction A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in its succeeding versions. Enterprises tend to deploy RODC under two conditions viz., When there is not enough physical security to the datacenter.When there isn’t…
Read more
Active Directory Fundamentals

Active Directory Recycle Bin 

What is Active Directory Recycle Bin?  The Active Directory Recycle Bin feature allows administrators to restore deleted AD objects. In Active Directory, objects such as users, computers, groups, or organizational units may be unintentionally removed. Administrators may find it difficult to correct such mistakes. Therefore, for administrators to easily retrieve deleted objects, Microsoft…
Read more
Active Directory Fundamentals

Active Directory Replication: What it is and how it works

What you will learn from this article? Information in the Active Directory (AD) network is modified or updated constantly. In such cases, if any information is updated in one domain controller (DC) of the AD network, all other DCs in the network should also be updated with the new information. This process is done in AD through replication. In this article, we will take a look at what is AD…
Read more
Active Directory Fundamentals

Understanding Active Directory Tombstone

What are Tombstones in Active Directory? When you delete an object from the Active Directory (AD) database, it’s marked as a tombstone object instead of being fully removed. By default, each tombstone object remains in the database for 180 days. Once this tombstone’s lifetime value is exceeded, the tombstone object is automatically deleted by the garbage collection process.
Read more
Active Directory Fundamentals

Access Control List (ACLs) and Access Control Entries (ACEs)

What you will learn: In this article, we will take a look at what an access control list (ACL) and an access control entry (ACE) are, the components that make up an ACL and ACE, and also dive into the types of ACLs and ACEs, and their purposes. What are Access Control Lists, and why do we need them? In an Active Directory network, not all users or computers would require access to all the…
Read more
Active Directory Fundamentals

Difference between Disabled, Expired and Locked Account

Introduction: The process of administering and monitoring the activities of the Active Directory service, which is typically found in Windows Server operating systems, is known as Active Directory management. The major goal of AD management is to automate Active Directory user provisioning operations, compliance with rules and audits, security, and centralized access to each user’s…
Read more
Active Directory Fundamentals

What is a workgroup and how is it set up?

Authenticating users in a computer network. Employees in any organization, big or small, need to log in to their computers at the start of their work day. Logging in gives them access to shared files, folders, printers, critical applications related to work, as well as the internet. Organizations need to authenticate and verify the identity of each user before they gain access to these…
Read more