AD Domain ServicesArchitecture & Design

Configuring Port Forwarding in Windows Using NETSH

Port forwarding is a technique used to direct network traffic from one network port to another. In Windows, the NETSH (Network Shell) command-line tool can be used to set up port forwarding. This article provides a detailed guide for system administrators on how to configure port forwarding using NETSH, a task essential for various network management and troubleshooting scenarios. Understanding…
Read more
AD Domain ServicesArchitecture & Design

Configure domain password policy - Here’s how

In this article, we delve into configuring the Active Directory Domain password policy, essential for maintaining robust security and compliance within your organization. The following steps, inspired by user interactions and common queries, aim to provide a comprehensive understanding and hands-on approach for advanced system administrators. Prerequisites for Configuring Domain Password…
Read more
AD Domain ServicesArchitecture & Design

Before migrating to Active Directory Domain Services (AD DS) 2022

In today’s dynamic IT landscape, the need for organizations to be agile and adaptable is more pronounced than ever. Active Directory Domain Services (AD DS) stands as the cornerstone of organizational identity. While the allure of designing a brand-new AD infrastructure can be strong, especially with the ever-evolving features and security enhancements, the reality for most organizations is…
Read more
AD Domain ServicesArchitecture & Design

Removing an Exchange Server Mailbox from your environment

An Exchange server is Microsoft’s on-premises mail and calendar offering that allows organizations to streamline effective communication amongst employees. You will be required to remove Exchange Server Mailbox for the below reasons: When an organization is updating their existing Exchange server with a new oneWhen the Exchange server is migrated from on-premises/hybrid to cloud…
Read more
AD Domain ServicesArchitecture & Design

How to quickly check windows server uptime

Windows Server Uptime is a crucial metric to measure the stability and reliability of a server. It shows how long the server has been running without any interruption. In this article, you will learn how to quickly check Windows Server Uptime in three different ways. Before that, let’s understand why it is important to check windows server uptime.Checking the Windows Server Uptime is…
Read more
AD Domain ServicesArchitecture & Design

How to resolve an AD account lockout issue

Have you ever been frustrated why your account is getting locked out frequently in active directory? If your AD account keeps getting locked out, then you have come to the right place. Account lockouts are the biggest problem experienced by Active Directory (AD) users. They also account for the highest number of calls to IT support. Apart from users forgetting their login credentials, using a…
Read more
AD Domain ServicesArchitecture & Design

Report breaches to CERT-In within six hours: Indian government's order to organizations

On April 28, the Indian government’s Computer Emergency Response Team (CERT-In), the cyber response wing of Ministry of Electronics and IT (MeitY), issued a fresh order directing organizations (including service providers, intermediaries, data centers and corporate bodies) to report major security incidents, within six hours after notice. In a move to improve incident response, protect…
Read more
AD Domain ServicesArchitecture & Design

The OSI model: What it is and how you can use it

Developed by the International Organization for Standardization (ISO) in 1984 when network computing was at its nascent stage, the Open Systems Interconnection (OSI) model is the visual representation of how information interacts with different mediums—hardware and software components—within a network. OSI is a framework for vendors to standardize the interoperability between devices and…
Read more
AD Domain ServicesArchitecture & Design

Managing shared resources

Introduction When sharing resources in a common network, the biggest concern is delegating access levels to those resources. Permissions management is a critical security process since any pitfalls can make the organizations prone to data breaches. For example, consider a scenario where a new sales employee joins an organization. They need to be provided with access to things like sales…
Read more