Active DirectoryMicrosoft Technologies

Step-by-Step Guide to Setup Read-only Domain Controller (PowerShell Guide)

RODC are a great feature which is introduce with windows server 2008 in order to maintain a low risk domain controller in locations where it cannot guarantee physical security and the maintenance. Though out article we have discussed possible scenarios where we required a domain controller in a remote site. When considering a domain controller in remote site, the link between site is not the only…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Active DirectoryMicrosoft Technologies

Step-by-Step guide to force replication for an AD Object (PowerShell Guide)

Once object is added to a domain controller, it needs to replicate to all other domain controllers. otherwise users will face issues on login, using AD integrated application and services etc. The replication is depending on many different facts such as replication schedule, intra site connectivity. However sometime it is required to force the replication between domain controllers for fast…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Active DirectoryMicrosoft Technologies

Group Policy: WMI Filters in a nutshell

Windows Management Instrumentation (WMI) filters is another method that we can use to filter the group policy target. This method is only can use to filter the computer objects and it based on computer attribute values. As an example, WMI filters can use to filter out different operating system versions, processor architecture (32bit/64bit), Windows server roles, Registry settings, Event id etc.
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

Azure servicesMicrosoft Technologies

Step-by-Step Guide to setup Just-in-Time VM Access in Azure

In most common scenarios hackers targets open ports in servers to gain access. It can be web server port, RDP ports, SQL ports etc. If genuine users also use same ports to access the system it’s hard to keep these ports closed. There are other methods such as firewalls that we can use to secure the access but it will still keep the ports open. when it comes to public clouds, its increase…
Read more

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes