Vipan Kumar

How to restrict user login for particular system or time

Restricted logon hours is done by editing a user's account in the way described below: Open the user object whose…

1 year ago

Seize FSMO roles on a Domain Controller

Transferring one or more FSMO roles from one Domain Controller to another is a simple operation. However, assuming that all…

2 years ago

How to Authorize DHCP Server 2016 in Active Directory

One of the first steps after installing the DHCP role on Windows Server 2016 (or older versions) is to authorise…

2 years ago

Windows Server release information

Windows Server is moving to the Long-Term Servicing Channel (LTSC) as our primaryrelease channel. The Windows Server Semi-Annual Channel (SAC)…

2 years ago

KB5020805: How to manage Kerberos protocol changes related to CVE-2022-37967

Summary The November 8, 2022 Windows updates address security bypass and elevation of privilege vulnerabilities with Privilege Attribute Certificate (PAC)…

2 years ago

What is SOX Compliance and What Are the Requirements?

The Sarbanes-Oxley Act of 2002 was a law passed by the United States Congress to protect customers and the broader…

2 years ago

Common Types of Cyber Attacks and How to Prevent Them

What exactly is a cyber attack? A cyber attack occurs when an attacker attempts to obtain unauthorized access to an…

2 years ago

What is Active Directory and How Does It Work?

Active Directory is used by organisations of all sizes all over the world to help manage permissions and restrict access…

2 years ago

Directory data store

The Active Directory directory service uses a data store for all directory information. This data store is often referred to…

2 years ago

What is Active Directory?

What is Active Directory  Active Directory is a directory service developed by Microsoft for Windows domain networks. It is included…

2 years ago