One of the basic principles of an Active Directory domain migration is the access to resources in the source domain based on SIDHistory information of the migrated user-account or group. The SID of the object in the source domain is written into the SIDHistory attribute of the object in the target domain. This enables the […]
The usage of digital certificates for encrypted communication and lettering of data like email is a top item on most companies’ wish list. Surprisingly many companies still don’t use it. Therefore I want to give you a brief overview of the technical method that is applied when you use digital certificates. In my example I […]
Event ID 10016 – Solving the DCOM Security Policy message in SharePoint 2010 step-by-step. In the last half year we designed and built a 3-step SharePoint 2010 environment for a major customer who asked us to run a SPRaaS (SharePoint RAP as a Service) by Microsoft. As usual, the findings are collected in an Excel-table […]
I realized that many do not know how to switch between IPv6 and IPv4 Ping. The only thing you have to do is to add a parameter when pinging.
I reviewed the AD configuration at a customer’s lately and had to deal the option “Bridge all site links”. You can find the option in the Active Directory Sites and Services configuration. Here is my brief summary for you:
I am planning to expand a VMWare ESX farm. What are the requirements the new host has to fulfill.
How to deal with SharePoint service accounts? The following questions always come up at the beginning of a SharePoint project: Which accounts are needed? When does it make sense to use dedicated accounts for special tasks? Which permissions are necessary? Who does really need the right ‘logon as a service’?
Last week I faced the easy task to activate LDAPs on Windows Server 2008 R2 domain controllers. One of the applications required an encrypted LDAP connection, because password changes are done via LDAP. I thought: Hey, that’s easy – just create a server certificate for the DC, import the certificate for the computer account under […]
Do you wan to know more about a group policy, its parameters and and further explanations? Microsoft explains all group policies on a really great website.
Finding errors that occur only a few times per day is difficult. The small tutorial shows you how to automate Microsoft Network Monitor Traces to find the error.
- PowerShell: Find active computer objects
- Nesting groups in Active Directory
- Create home directory and grant permissions with PowerShell
- Creating an individual random password with PowerShell
- Retrieve Active Directory subnets with PowerShell
- Editing users of other domains – with PowerShell
- Azure Basics: Connecting with Azure (PowerShell)
- PowerShell Custom Objects
- Logon Script does not start on Windows Server 2012 R2 domain
- IsMember – Check group membership in Active Directory