Active Directory Fundamentals

Restricting logon to specific machines

Restricting logon to specific machines: the expert guide Restricting logon to specific machines means enforcing which Windows computers a given user may sign in to—locally or via Remote Desktop—using Active Directory controls such as userWorkstations (“Log On To…”) and computer-side User Rights Assignment policies (“Allow/Deny log on locally” and “Allow/Deny log on…
Read more
Active Directory Fundamentals

How to handle user SID-related tasks

Handling user SID-related tasks: from first principles to field-tested operations Security identifiers (SIDs) are the nucleus of identity and authorization in Windows and Active Directory. Every access check, every token, every ACL decision hinges on these opaque strings. If you run AD at any real scale, you’ll spend real time handling user SID-related tasks: looking up SIDs…
Read more
Active Directory Fundamentals

Principles from Microsoft AD hardening series

Principles from Microsoft’s Active Directory Hardening Guidance Microsoft has published years of Active Directory (AD) security guidance across documents, reference architectures, “security hardening” checklists, and the broader identity security model used for Windows, Entra ID, and hybrid environments. The specifics evolve, but the…
Read more
Active Directory FundamentalsActive Directory Policies

How to enforce policy changes with minimal topology disruption

Enforcing policy changes with minimal topology disruption In Active Directory, “policy change” usually means Group Policy, security baselines, authentication hardening, and configuration shifts that must apply consistently. “Topology disruption” is what happens when enforcement is achieved by rearranging the directory—moving OUs, splitting…
Read more
Active Directory Fundamentals

Leveraging AD improvements for hybrid cloud usage

Leveraging AD improvements for hybrid cloud usage Hybrid identity is rarely “cloud identity plus legacy AD.” In most enterprises, Active Directory (AD DS) remains the authoritative source for many user and computer identities, authentication policies, and operational workflows—while cloud services depend on Microsoft Entra ID (Azure AD) and…
Read more
Active Directory FundamentalsActive Directory ObjectsRecent Posts

Managing AD metadata cleanup post-DC decommission: A Playbook

Active Directory behaves as if that DC never existed. This guide goes beyond “delete in ADUC” and covers DNS SRV/CNAME integrity, KCC recomputation, lingering objects, and RODC specifics. Focus: metadata cleanup Covers: ADUC/ADSS/ntdsutil Also: DNS SRV, KCC, DFSR, RODC Quick nav Why this matters now Definition & blind spots Under the hood Production-ready Runbook Inherent…
Read more
Active Directory FundamentalsActive Directory PoliciesRecent PostsTop Read Articles

SID filtering in complex AD layouts: the one-bit boundary that decides what crosses your forest

Quick definition: SID filtering is a trust-side control that removes foreign SIDs—including values in SIDHistory—from a user’s authorization data as it traverses a trust. It prevents privilege escalation by honoring only the SIDs the trusting side expects. Answer box (at a glance) External/domain trusts: Quarantine=Yes by default → accept only SIDs from the directly trusted…
Read more
Active Directory FundamentalsActive Directory Policies

AD high-availability: RODCs and cross-site redundancy

Active Directory high availability Design for the worst day: local logons at branch speed, safe failover by intent—not accident. RODC Sites & Services Next Closest Site Password Replication Policy Definition (snippet-ready): AD high availability with RODCs and cross-site redundancy is the practice of placing read-only domain controllers in low-trust or connectivity-constrained sites and…
Read more
Active Directory FundamentalsActive Directory PoliciesRecent Posts

Transitioning AD schema versions safely: runbook & pitfalls

Active Directory The schema is your forest’s data contract. When you raise its version—via adprep or app extensions—you change what can exist and how it behaves. This self-contained guide explains the why, the risks, and a precise runbook you can use in production. Reading time: ~16–20 minutes On this page Why schema transitions matter now What the schema actually is First…
Read more