Security Bulletin Severity Rating System May 23, 2017, 12:13 p.m.

This system, which we revised in December 2011 based on customer feedback, is intended to help our customers decide which updates they should apply under their particular circumstances, and how rapidly they need to take action.

windows sysadmin security

Script Windows Update PowerShell Module May 15, 2017, 4:11 p.m.

This function is a piece of PSWindowsUpdate module to manage Windows Update on a computer system running Windows. Whole module contain set of functions to check, download and install updates from PowerShell.

windows powershell security

Microsoft Explains Windows Server 2016 Patching May 10, 2017, 4:53 p.m.

For Windows Server 2016 installations, a security update arrives first, followed by a quality update a couple of weeks later. Cumulative updates with new security fixes arrive on the second Tuesday of each month ("patch Tuesday"). Cumulative updates with new quality fixes arrive on the fourth Tuesday of each month. Windows Server 2016 updates first arrive as "optional" updates, but they later become "recommended" updates after two weeks.

security sysadmin windows windows server 2016

Disabling User Account Control (UAC) on Windows Server May 3, 2017, 8:15 a.m.

Under certain constrained circumstances, disabling User Account Control (UAC) on Windows Server can be an acceptable and recommended practice.

security sysadmin windows

Setting AD Group Managers with PowerShell May 2, 2017, 2:19 p.m.

From time to time you may want to delegate control of an AD security group to an unprivileged user. The group manager property is an LDAP property on the group object that contains the Distinguished Name of a given user account. The checkbox that allows the group manager to modify who is a member of this group is not an LDAP property with a boolean type, that would be too simple and not line up with the Microsoft security management methodology. It's implemented as an Access Control Entry (ACE) in the objects Discretionary Access Control Li (DACL). Think of it like the permissions when looking at the Security tab for a file. These can be manipulated programatically.

active directory windows sysadmin

Windows proxy settings explained April 12, 2017, 8:25 a.m.

In Windows environments, proxy settings are typically configured in the ‘Internet Options‘ for Internet Explorer. Other applications can also use this information. Still, there are some applications and services that will not be able to use the IE proxy server. This post will describe why and how you can configure the different proxy settings.

windows proxy

How to use DNSLint to troubleshoot Active Directory replication issues March 30, 2017, 3:51 p.m.

DNSLint is a Microsoft Windows utility that can help you determine whether all DNS servers that are supposed to be authoritative for the root of an Active Directory forest actually have the necessary DNS records, and can resolve all of the necessary DNS records to successfully synchronise partition replicas among domain controllers in an Active Directory forest.

active directory windows sysadmin dns

DNSLint March 30, 2017, 3:28 p.m.

DNSLint is a Microsoft Windows utility that helps you to diagnose common DNS name resolution issues.

windows sysadmin dns

Name Resolution in Windows March 28, 2017, 9:10 a.m.

When the GetHostByName API is used, the Windows 2000 resolver first submits the name query to DNS. If DNS name resolution fails, the resolver checks whether the name is longer than 15 bytes. If it is longer, resolution fails. If not, the resolver then checks whether NetBIOS is running. If it is not running, resolution fails. If it is running, the resolver then tries NetBIOS name resolution.

windows sysadmin dns

Windows Server 2012 RDS: Enabling the RD WebAccess Expired password reset option March 23, 2017, 3:05 p.m.

Windows Server 2012 comes with an option to support the ability to let users changes their password from within the RD Webaccess interface in case it's expired.

windows sysadmin rds windows server 2012

Fix my IT system: Customise RDS Web access login pages March 23, 2017, 2:57 p.m.

The files that need to be edited are located in C:\Windows\Web\RDWeb\

windows sysadmin rds

Set application settings in IIS through PowerShell March 20, 2017, 2:20 p.m.

  1. Open IIS
  2. Click on the site you want to target.
  3. Open Configuration Editor
  4. Make the change
  5. Then click "Generate Script" on the top right.
sysadmin windows web

Well-known security identifiers in Windows operating systems March 9, 2017, 10:09 a.m.

A security identifier (SID) is a unique value of variable length that is used to identify a security principal or security group in Windows operating systems. Well-known SIDs are a group of SIDs that identify generic users or generic groups. Their values remain constant across all operating systems.

windows sysadmin

Windows audit policy and best practices March 6, 2017, 4:43 p.m.

Windows Audit Policy is used to determine the amount of data logged by Windows security on domain controllers and other computers on the domain. These definitions were found to be most effective from both a best practice and compliance standpoint and are based on customer experience and recommendations from Microsoft.

active directory windows security

Best practice for Default Domain Policy and Default Domain Controllers Policy March 6, 2017, 4:33 p.m.

Microsoft has some good guidance on this topic, but it’s not always clearly and consistently stated. Here’s a quick Q&A that might help.

active directory windows sysadmin best practice

Create the Key Distribution Services KDS Root Key March 3, 2017, 8:10 a.m.

The domain controllers will wait up to 10 hours from time of creation to allow all domain controllers to converge their AD replication before allowing the creation of a Group Managed Service Account (gMSA). Workaround with Add-KdsRootKey –EffectiveTime ((get-date).addhours(-10)).

active directory windows

Active Directory Naming Contexts and Application Partitions Feb. 24, 2017, 3:09 p.m.

Think of a domain as a big data partition, which is also referred to as a naming context. Only domain controllers that are authoritative for a domain need to replicate all of the information within that domain. Information about other domains is not needed on those domain controllers. On the other hand, there is some Active Directory data that must be replicated to all domain controllers within a forest.

active directory windows

System Error Codes (Windows) Feb. 22, 2017, 4:06 p.m.

The System Error Codes are very broad.

windows reference

The LastLogonTimeStamp Attribute – What it was designed for and how it works Jan. 18, 2017, 9:44 a.m.

It is important to note that the intended purpose of the lastLogontimeStamp attribute to help identify inactive computer and user accounts. The lastLogon attribute is not designed to provide real time logon information. With default settings in place the lastLogontimeStamp will be 9-14 days behind the current date.

active directory windows sysadmin

Kerberos Explained Dec. 26, 2016, 10 a.m.

The process of authenticating the identity of users during log-in is the first step in gaining system access. For local machines that aren't actively participating in a domain, Windows NT LAN Manager protocol is still utilized to verify a user's name and password before granting system access. However, in domain environments, Microsoft has coupled Active Directory closely with Kerberos. Once access is granted, tickets that permit specific access to other system resources within the domain are exchanged.

windows sysadmin