All TechNet Magazine Topics
Geek of all Trades: Microsoft's New Certifications: What They Are, Why They Matter
Greg Shields - August 2009
With the Microsoft Certified Systems Engineer credential being retired for all iterations but Windows Server 2003, a new certification program has been created. Greg Shields explains how this new certification path helps to better identify where your skills lie.
Group Policy: Automating Group Policy Management with Windows PowerShell
Darren Mar-Elia - June 2009
Group Policy is used in almost every environment and relied on by many to secure and their Windows environment. Surprisingly few have introduced automation into the process, however. This article explains how to take advantage of the GPMC APIs and Windows PowerShell to automate management of Group Policy in your organization.
Active Directory: Using Catch-All Subnets in Active Directory
John Policelli - June 2009
In an ideal world, users are directed to the appropriate domain controller for Active Directory authentication, but this is not necessarily what happens in most organizations due to IP subnet information not being properly defined in Active Directory. This article presents a solution to ensure users locate the appropriate DC for authentication—a catch-all subnet to catch the authentication from clients on subnets are not defined in Active Directory.
Active Directory: Export, Compare, and Synchronize Active Directory Schemas
John Policelli - April 2009
If your organization has multiple Active Directory forests, you need to manage multiple Active Directory schemas and ensure consistency between schemas. Check out our step-by-step guide to comparing and synchronizing Active Directory schemas in multi-forest environments.
Inside SharePoint: Security and Compliance with AD RMS
Pav Cherny - April 2009
SharePoint integration with AD RMS can be useful for extending security and regulatory compliance solutions beyond the SharePoint environment. But for real security, the SharePoint environment must be secure within itself.
Interop: Authenticate Linux Clients with Active Directory
Gil Kirkpatrick - December 2008
Many IT shops are divided into two camps—the Windows team and the Linux team—but we all have the same ultimate goal of providing high-quality and cost-effective IT services. One way you can do this is by sharing core software infrastructure. Think Windows and Linux don’t mix? See how you can configure Linux machines to use Active Directory for authentication.
Interop: Interacting with Windows from a Mac Environment
Wes Miller - December 2008
How times have changed! These days it is fairly easy to bring Macs into your Windows network infrastructure. And with a little work you can even integrate some of the operating system services. Learn how to connect Macs to Active Directory, see how you can use Entourage with Exchange, integrate the Messenger for Mac 7 application with your Windows-based communications, and explore how you can bridge the platforms with virtualization.
Active Directory: Understanding Proxy Authentication in AD LDS
Ken St. Cyr - December 2008
Proxy authentication lets users perform a simple bind to an Active Directory Lightweight Directory Services instance but still have an association to an Active Directory account. This can be very useful: it gives developers full access to a user object without giving them access to the Active Directory account, and it allows products that require the X.500 format to be used with Active Directory. Here’s what you need to know about proxy authentication.
Windows Administration: Active Directory Backup and Restore in Windows Server 2008
Gil Kirkpatrick - May 2008
Windows Server 2008 and the new Windows Server Backup utility bring many changes and welcome enhancements to backing up. Here is an in-depth guide to backing up and restoring Active Directory in the new server OS.
Special Coverage: Windows Server 2008: What's New in Active Directory Domain Services
Gil Kirkpatrick - March 2008
Windows Server 2008 introduces some substantial enhancements to Active Directory Domain Services. Take a close look at how read-only domain controllers and Windows Server Core improve security in your environment, how the new Server Manager and revamped backup simplify management, and how the new auditing tools help ensure compliance.
Windows Administration: A Guide to Active Directory Replication
Laura E. Hunter - October 2007
Active Directory provides a great deal of flexibility for supporting a large or decentralized environment, but maintaining the integrity of your data can be challenging. Active Directory replication defines how updates are communicated throughout your environment and how conflicts are resolved. Here's what you need to know to meet the challenge.
Windows Server: 11 Essential Tools for Managing Active Directory
Laura E. Hunter - September 2007
In a large organization, even the most common Active Directory tasks, such as adding and modifying objects, can be tedious and time-consuming. These 11 tools can make Active Directory management a lot easier.
Windows Server: Reanimating Active Directory Tombstone Objects
Gil Kirkpatrick - September 2007
There are a few essential tricks and tools that should be included in every Active Directory disaster-recovery plan. Tombstone reanimation is one of these techniques, offering the only way to recover deleted objects without taking a domain controller off line. Here’s a guide to finding and recovering tombstones in Active Directory.
Hey, Scripting Guy!: Who Are You?
The Microsoft Scripting Guys - August 2007
With Active Directory, users can have a variety of identities, such as givenName, displayName, userPrincipalName, or distinguishedName. As a system administrator, how do you get all this information about a user? With a script, of course.
Windows Administration: Disaster Recovery: Active Directory Users and Groups
Gil Kirkpatrick - April 2007
Data recovery in Active Directory can be very complex, yet it’s essential that you have a recovery plan in order. We show you how Active Directory stores, deletes, restores, and replicates objects so you can be prepared the next time a user or group membership is accidentally deleted.
Inside Microsoft.com: Using Active Directory Federation Services
Jim Guthrie - April 2007
Microsoft provides an extranet for its business partners, and this extranet requires that each external user have a unique domain account. Find out how Microsoft is planning to use Active Directory Federation Services to make a better user experience while streamlining the management involved.
Windows Administration: Delegating Authority in Active Directory
Joel Yoker and Rob Campbell - February 2007
Implementing delegation in Active Directory can enhance security and simplify management tasks, and getting started is easier than you think. Here are some simple delegation models that will work in most IT infrastructures with little modification.
Windows Administration: Dig into New Group Policy Templates in Windows Vista
Darren Mar-Elia - February 2007
Windows Vista introduces significant changes to Group Policy templates. Find out everything you need to know about the new format, called ADMX, and how these changes will improve the administration of system configurations.
Windows Administration: Your Guide to Group Policy Troubleshooting
Derek Melber - February 2007
Getting to the bottom of Group Policy issues can be a difficult process, but understanding how Group Policy works, and where problems can arise, makes things easier. This overview will help you troubleshoot Group Policy issues like a guru.
Windows Administration: Monitoring Active Directory with MOM
John Hann - February 2007
Management packs for Microsoft Operations Manager 2005 allow you to more effectively monitor your IT infrastructure. See how these five management packs can help you keep an eye on the health, security, and reliability of your Active Directory environment.
Security Watch: Lock Up Your Domain Controllers
Steve Riley - September 2006
Managing Identity: Automate Active Directory Group Management
Craig Owen - July 2006
Group management is central to today's businesses. Groups are commonly used to control access to network resources, computers, buildings, and so on. Simultaneously, they need to grant access to
Managing Identity: Simplify Single Sign-on Using ADFS
Matt Steele - July 2006
Managing Identity: Create Custom Directories with ADAM
Brian Redmond - July 2006
Active Directory Application Mode, also known as ADAM, is often misunderstood. In this article I will demystify ADAM, explain how it can be a useful tool in many organizations, and show you some valuable utilities that make it easier to use.
Security: 19 Smart Tips for Securing Active Directory
Sean Deuby - May • June 2006
Does Active Directory keep you up at night? One could easily understand why. It is most likely the largest and most critical distributed system in your enterprise. Along with
Utility Spotlight: Limit Login Attempts With LimitLogin
- Spring 2005
Ever needed to limit concurrent user logins in an Active Directory® domain? Ever wanted to keep track of information about every login in a domain? If so, LimitLogin is for you.