Verification of Active Directory users can sometimes be quite complicated. This is particularly the case when a user is unable to login to the Domain. It can be tough to assess the issue if the user is tied to the system and does not have rights to login to other computers. Changing the password or unlocking the account can only be useful if the password has expired, the user account Continue Reading →
Remote Assistance is a Windows feature by which a client operating system can send request for help to an administrator or friend. The Helper can even be allowed complete control of the user’s desktop, provided its allowed by the assisted person. There are also features in Active Directory (Windows Server 2008) that can be configured to set preferred remote assistance settings. In this post we will explain remote assistance methods Continue Reading →
To implement Domain policies for Active Directory users, it is first necessary for the client operating system to join a Domain. The policies are implemented after the client computer comes under the umbrella of the Domain itself and logs in from the Domain credentials. In this post I will tell you the two basic methods that can be used for joining a Domain from a Windows 7 client operating system.
It often happens that a user forgets his/her password and instead of asking the Domain Administrator to reset the password, they attempt to login by using the trial and error method. This results in the lock out of their account because of which a user cannot login again, (even with a valid password). An account can also get locked due to synchronization problems between the domain and other systems. Furthermore, Continue Reading →
When creating a user in Active Directory, there are several user account related options that can greatly enhance network security via user authentication and encryption methods. The choices range from a simple password change at first logon, to smart card support. In this post I will tell you what options are available to apply on Active directory users in a Domain environment in Windows Server 2008 and what can be Continue Reading →
Previously I provided you with a guide about “How To Create Windows Server 2008 Domain & Things To Consider”. In this post I will explain the procedure involved in creating Domain users from Active Directory in Windows Server 2008. It is worth mentioning here that the same method more or less applies in many pre-Windows Servers 2008 operating systems, for creating Domain users, (e.g. Windows Server 2003).
Post Update: You can get the latest Windows Server 2012 Build from this link. To start using Windows Server 8 (Windows Server 2012) you can download the ISO from the MSDN website. Windows Server 8 Developer Preview is currently available only for those developers who actually subscribe to MSDN and can access and download the Windows Server 8 Developer Preview. However, the Windows 8 Developer Preview Build 8102 Milestone 3 Continue Reading →
SysAdmin Anywhere is an Active Directory Domain administration software which provides information about resources such as the Domains, servers, client computers, users and groups, etc on a network and provides easy configuration options. Interestingly, it has a Windows 8 style Metro user interface which gives it a visually appealing look. With SysAdmin Anywhere you can create network software and hardware inventories, edit and manage users, groups, computers, etc and obtain Continue Reading →
In this post I will tell you how to create Windows server 2008 domain and what things you should consider while setting up your Domain controller. The below post shows a step by step guide for creating aDomain in a new forest. In this article I am using Windows Server 2008 R2 to create a domain, the same configurations apply for the 32-bit version.
Many companies employ temporary or part-time employees to supplement work load. Since these individuals have a minor stake in the organization, therefore, they also represent a possible security vulnerability. Even trusted employees in many organizations have led to exposing company secrets and stealing information. A remedy to such a security void is normally to deploy end point security, use proxy servers and apply strict Domain policies. However, to allow an Continue Reading →