Browse by Tags

Tagged Content List
  • Blog Post: Network Properties in a hurry

    Hi. Jim from DS here again to show you how to quickly access the properties of your network interface cards via a custom desktop shortcut. In my previous blog post I put together a lovely “at a glance” reference to launching administrative and system tools from the command line and START...
  • Blog Post: Throw Away Your Mouse! A List of Windows Snap-ins and Applets

    Hi. This is Jim from Directory Services. I spend a great deal of time working through remote Easy Assist / Live Meeting sessions, sometimes with client machines half way round the globe and the latency can be excruciating. In my experience I have found that using the CMD line as well as START - RUN...
  • Blog Post: The Security Descriptor Definition Language of Love (Part 2)

    Hi. Jim here from DS here with a follow up to my SDDL blog part I. At the end of my last post I promised to dissect further the SDDL output returned by running the CACLS with the /S switch on tools share as follows: Here is the output exported to a .txt file: "D:AI(D;OICI;FA;;;BG)(A;;FA;;;BA...
  • Blog Post: AskDS is 12,614,400,000,000,000 shakes old

    It’s been four years and 591 posts since AskDS reached critical mass. You’d hope our party would look like this:  But it’s more likely to be: Without you, we’d be another of those sites that glow red hot, go supernova, then collapse into a white dwarf . We really appreciate your comments, questions...
  • Blog Post: Speaking in Ciphers and other Enigmatic tongues…

    Hi! Jim here again to talk to you about Cryptographic Algorithms, SChannel and other bits of wonderment. So, your company purchases this new super awesome vulnerability and compliance management software suite, and they just ran a scan on your Windows Server 2008 domain controllers and lo! The software...
  • Blog Post: Troubleshooting Credential Roaming

    Hi. Jim here again from Directory Services with a follow up to my Understanding Credential Roaming blog post. To review, credential roaming makes it possible to roam the user's credentials in a manageable, secure manner that is ultimately transparent to the user. What follows is a deeper dive into the...
  • Blog Post: I’ll take NDES in the DMZ, for 1000 Alex

    Hello. Jim here yet again to talk to you about deploying Windows Server 2008 R2 with the Network Device Enrollment Services (NDES) role in a secure perimeter network. Let's consider the scenario. You have an internal PKI hierarchy consisting of an Offline Root Certificate Authority (CA), a policy CA...
  • Blog Post: Certs On Wheels: Understanding Credential Roaming

    Hi. Jim here again from the Directory Services team. Today I will break down some of the core components of credential roaming and how it functions. To secure critical transactions such as signing, encrypting, and decrypting e-mail or authenticating identity, many environments rely on certificates. The...
  • Blog Post: Configuring Change Notification on a MANUALLY created Replication partner

    Hello. Jim here again to elucidate on the wonderment of change notification as it relates to Active Directory replication within and between sites. As you know Active Directory replication between domain controllers within the same site (intrasite) happens instantaneously. Active Directory replication...
  • Blog Post: The Security Descriptor Definition Language of Love (Part 1)

    Hi. Jim from DS here to tell you more than you ever wanted to know about the Security Descriptor Definition Language (SDDL). Windows uses SDDL in the nTSecurityDescriptor. The SDDL defines string elements for enumerating information contained in the security descriptor. You may want to grab some coffee...