General Management
Flush DNS - All you need to know
Introduction Flushing the DNS cache is a common troubleshooting technique used to resolve various network connectivity issues. It involves clearing the locally stored DNS information on a device, allowing it to retrieve updated DNS records from the ...
NSLookup: A Comprehensive Guide
Introduction NSLookup is a fundamental and powerful network administration command-line tool used to query the Domain Name System (DNS). It allows users to obtain crucial information about DNS records, troubleshoot DNS-related issues, and perform ...
PSExec - All You Need to Know
Introduction PSExec is a powerful and versatile command-line tool developed by Sysinternals, now owned by Microsoft. It enables system administrators and IT professionals to execute processes remotely on Windows computers within a local network. ...
Transitioning your Active Directory to Windows Server 2008 R2
Transitioning AD to Windows Server 2008 R2 Introduction Active Directory (AD), a service provided by Microsoft, functions as a central database for securely storing and managing information about user accounts, user groups, applications, and other ...
How to navigate to Active Directory users and computers
Launching Active Directory Users and Computers (ADUC) Introduction Active Directory (AD), a service provided by Microsoft, functions as a central database for securely storing and managing information about user accounts, user groups, ...
How to create Recipient and Mail management policies in Exchange that use AD Groups
Creating a mail-enabled security group In the new EAC, navigate to Recipients > Groups > mail-enabled security. Click Add a group and follow the instructions in the details pane. Under Choose a group type section, select mail-enabled security and ...
How to document Exchange Server configuration with PowerShell
Introduction: You may be in a scenario where you would need to document your Exchange Server before upgrading to a newer version or migrating to a new server machine. This process can be easily done using PowerShell. Let's see how you can document ...
How to recover deleted messages in a user's mailbox in Exchange Online
Introduction There could be instances where a user might have deleted his or her email messages from the mailbox, or the email messages would have been automatically deleted and would want to recover the email messages later. In such scenarios, users ...
How to hide a user or list from Exchange Address books
Introduction Hiding a user or a list from the Address book will result in the user or list will not appear in the Global Address List (GAL). This means that the particular user or list will not appear in services, or search results of the ...
How to move an existing Exchange server to a new computer
Introduction: There can be several reasons for migrating an existing Exchange server to a new server machine. The existing server machine could be at the end of its warranty period or would need to be decommissioned for many other reasons. Migrating ...
How to allow or prevent non-admin users from rebooting or shutting down Windows
Introduction When a computer machine is shut down, all its software processes are stopped, the users will be signed out, and the hardware will be completely shut down. Depending on the circumstance, this may or may not be beneficial. For example, ...
How to Transfer FSMO Roles on Server 2019 using PowerShell
Transferring FSMO Roles in Active Directory In Active Directory, the Single Master model is modified to split the responsibilities of the single master into multiple roles. These roles are called the Flexible Single Master Operation (FSMO) roles and ...
Restricting Access to Folders using Traverse Folder Permission
How to Use NTFS Advanced Permissions to Restrict Access to Parent Folders Consider a scenario where the parent folder named A consists of child folders B1 and B2. The employees belonging to a certain group need to access only folders B1 and B2. Hence ...
How to Map a Network Drive to Show only the Folders for which the User has Access
How to Map a Network Drive and Enable Access Based Enumeration Drive mapping is a technique that is used to simplify the process of accessing shared folders from a local computer. In mapping, a drive letter is assigned to a shared folder, letting the ...
How to Change Account Lockout Policy using Group Policy Objects in Active Directory
Changing the Active Directory Account Lockout Policy Introduction to Active Directory Account Lockout Policy Account lockout policies are used by IT administrators to lock out an Active Directory account after multiple unsuccessful attempts. It is ...
How to View and Change Active Directory Object Attributes
Changing the Object Properties in Active Directory Objects in Active Directory are entities that are used to represent entities such as users and devices that make up the Active Directory network. Examples of objects include users, computers, ...
How to view NTFS effective permissions
How to View NTFS Effective Permissions on Files and Folders What is NTFS? The New Technology File System, commonly abbreviated as NTFS, is the standard file system used in Windows NT and later versions of Windows operating systems. It is used to ...
How to setup Sites and Subnets in Active Directory: Step-by-step guide
Introduction to Active Directory Physical Topology Active Directory is composed of two different types of network structures or topologies, namely the logical topology and the physical topology. The logical topology is made up of components such as ...
Best Practices | Active Directory FSMO Roles
FSMO Roles in Active Directory In Flexible Single Master Operation, the responsibilities of the single-master are split into separate roles. These roles can be distributed to any domain controller in the enterprise, based on the requirements. This in ...
Seizing FSMO Roles from a Dead Domain Controller | Step-by-step guide
A quick introduction to Flexible Single Master Operation (FSMO) Active Directory uses the multi- master model for replicating changes between domain controllers. This multi-master enabled database allows changes to occur on any domain controller ...
Raise Active Directory Domain and Forest Functional Levels | Step-by-step guide
What are Functional Levels in Active Directory? Active Directory functional levels help to determine the features that available for the domain or forest. There are two types of functional levels in Active Directory; they are the Domain Functional ...