Active Directory FundamentalsRecent Posts

Hyper-V Virtualization: An explanation

What you will learn from this article: There are many scenarios where something would need to be tested on a server or a computer machine. In such scenarios, instead of using a physical test machine, it would be better to use a virtual representation of a target machine, so that should anything go wrong, this ‘virtual machine’ can be shut down without affecting the real machine.
Read more
Active Directory FundamentalsRecent Posts

Active Directory Users and Computers – Part II

In part I  of Active Directory Users and Computers, we introduced the Active Directory Users and Computers (ADUC) snap-in. We also saw a list of tasks an administrator can perform from the ADUC console and described how to perform a few basic tasks. In this part, we will look at some advanced tasks that will come in handy for an administrator managing users, computers, and other objects in…
Read more
Active Directory FundamentalsRecent Posts

Active Directory Users and Computers (ADUC) - An introduction and installation guide

Active Directory Users and Computers (ADUC) is a common tool used by administrators to carry out daily tasks and much more in Active Directory AD. Some of the tasks an administrator can perform with the help of this MMC snap-in are as follows: Create and manage AD objects, such as users, computers, groups, and contacts, along with their attributes.Create Organizational Units (OU), move users…
Read more
Active Directory FundamentalsTop Read Articles

How to Raise Active Directory Forest Functional Level

What are Functional Levels? An Active Directory functional level determines what capabilities of Active Directory Domain Services (AD DS) are available for a particular forest or domain. The functional levels are specified in terms of Windows Server versions, as each version update brings with it a host of new AD DS functionalities. Functional levels have to be specified because their…
Read more
Active Directory Fundamentals

NTLM authentication and Kerberos Authentication Protocols Explained

What you will learn: A network needs to have security processes put in place to avoid the misuse of its resources. An authentication process goes a big way in identifying whether a person is who they say they are, or a fraud. Active Directory employed the NTLM authentication protocol to securely authenticate its users, which was then succeeded by the Kerberos authentication protocol. In this…
Read more