Creating a virtual floppy disk
Floppy disks seem to be died out. But it’s not the complete truth. From time to time one of these is still needed. Last week […]
Floppy disks seem to be died out. But it’s not the complete truth. From time to time one of these is still needed. Last week […]
With Windows Vista / 7 / 8 the “DC Locator Algorithm” has been improved. However, it needs to be activated by a group policy (GPO) […]
The Standard “Users” and the standard “Computers” container (in which new objects are to be created in default) can be easily changed with Windows standard […]
Many administrators use KiXtart and have developed their own login script. The script checks group memberships of the users during the log-in process to connect […]
Lately we found a security gap in Active Directory. We noticed that some accounts in Active Directory were active, but contained an empty password. This […]
After looking for the Microsoft KB article on Active Directory Group Nesting for the umpteenth time today, because I wasn’t sure on a particular issue, […]
We were recently faced with the task of automatically filling an Excel 2010 document with PowerShell on a Windows 2008 R2 Server. If you are […]
Infrastructure Master Role and Global Catalog Microsoft recommends not making the domain controller with the infrastructural master role the Global Catalog server. But this recommendation […]
Dynamic security groups are now possible in Active Directory. Dynamic distribution groups already exist in MS Exchange Server. So far they cannot be used to […]
Timestamps and changes of AD objects can be made visible with REPADMIN A well-known problem for many administrators: An error occured and when questioned what […]
Authorative and non-authorative restore Individual Active Directory objects that have been deleted accidently can be backed up proceeding an authoritative restore. You can restore single […]
Exchange 2007 is a 64 bit application with 64 bit management tools. Download the Exchange 2007 management tools for 32 bit operation systems from the […]
Not only user accounts, but also computer accounts use passwords to log on to the domain. The computer password is set by the client and […]
For the purpose of an Active Directory Migration first one or more domains are created parallel to the existing Active Directory structure. After the establishment […]
To administrate Windows 2008 R2, Windows 2008 or Windows 2003 systems via a Windows 7 client (SP1) Microsoft has released the Remote Sever Administration tools (RSA) […]
© 2026 · Directory-FAQ by firstattribute.com