In this step-by-step video tutorial we discuss how you can raise your domain functional level from 2012R2 to 2016 by using the Active Directory Domain and Trust console.
For a more detailed explanation, check out our article here 👇
https://www.windows-active-directory.com/domain-functional-level.html
For more such articles on Windows Server Management, visit our website…
How to locate an AD object | How to Active Directory
August 17, 2021
Manually digging through thousands of users, groups, and computers to find the required objects can be quite time-consuming. In this explainer video, we’ll look into how AD objects can be located using the command line and the Active Directory Users and Computers console.
Check out a more detailed explanation in our article here…
An account lockout policy is a built-in security policy that allows administrators to determine when and for how long a user account should be locked out. It determines what happens when a user enters the wrong password. In this video, we will learn how we can change the account lockout group policy in Windows Server 2012 Active Directory.
Check out a more detailed explanation in our article here…
How to edit AD Password Policies | How to Active Directory
August 17, 2021
To ensure a high level of security for user accounts in the Active Directory domain, an administrator must configure and implement a password policy that provides sufficient complexity, password length, and the frequency of changing user and service account passwords. Learn how to change the default password policy on Windows Server 2012.
Check out a more detailed explanation in our article here…
What is Azure Active Directory?
August 12, 2021
Azure Active Directory: Introduction
Azure Active Directory is a multi-tenant, cloud-based directory and identity management service provided by Microsoft. It offers identity and access capabilities for applications running in both Microsoft Azure and in an on-premises environment. It is the foundation for Office 365 and other SaaS applications; users are allowed to sign in and access the…
What you will learn:
An organization will consist of multiple employees, devices, contacts, and large amounts of data. It would need to sort all these resources and information in a structured manner for easy access, and also secure its resources. This is where directory services come into play. A directory service categorically arranges all the resources in a structured and hierarchical manner…
Microsoft Hello
May 18, 2021
For quite a long time, we have been following theroutine of typing in a password for accessing our computers. Strong password requirements make us set complex passwords which we often tend to forget, and then we frantically chase the administrator to reset our forgotten passwords. More importantly, even the most secure network is vulnerable to security breaches andthe network…
Microsoft Passport
May 17, 2021
Introduction
Using passwords is a common approach to protecting and securing a resource from unauthorized access. However, the use and maintenance of passwords have their shortcomings. One challenge is the difficulty of remembering passwords, more so, if complex requirements are in place. Another possibility is the repository containing the passwords is being breached. Microsoft has an…
Read only domain controller
May 17, 2021
Introduction
A read only domain controller (RODC) is a type of domain controller that has read-only partitions of Active Directory Domain Services (AD DS) database. RODC is available in Windows server 2008 OS and in its succeeding versions. Enterprises tend to deploy RODC under two conditions viz.,
When there is not enough physical security to the datacenter.When there isn’t…
What you will learn:
In this article, we will take a look at what an access control list (ACL) and an access control entry (ACE) are, the components that make up an ACL and ACE, and also dive into the types of ACLs and ACEs, and their purposes.
What are Access Control Lists, and why do we need them?
In an Active Directory network, not all users or computers would require access to all the…