Author Archives: itwanderer

Enabling Legal Hold on Exchange 2010

How do you enable legal hold on a mailbox? Pretty simple, right?  There are multiple ways to do it as can be seen here:  Place a Mailbox on Legal Hold Is there another way to do this? However, if for … Continue reading

Posted in Uncategorized | Leave a comment

Useful Utilities

This is  a living document thet will list useful tools Meeting/Videoconference join.me – free basic, organizer can share desktop, but not attendees.  making other attendees as presenter part of pro, paid package meetingburner.com – free accounts includes 15 attendees, organizer … Continue reading

Posted in Uncategorized | Leave a comment

Powershell – References

E-Book by Dr. Tobias Weltner

Posted in References, Scripting | Leave a comment

Tread Lightly – Kerberos Encryption Types

Or better yet, make sure you know what you are doing before you make any changes.  Otherwise, you could be in for a world of hurt. Why all the fuss? One of the major changes with Windows 7 and Windows … Continue reading

Posted in Active Directory | Leave a comment

Importing a PFX File Using CertUtil.Exe

Instead of using the GUI (Certificate Services Snapin), you can use certutil.exe to import a pfx file (private and public key combined).   certutil.exe -importPFX pfxfilename   You’ll get prompted for the password.   More information from the Windows PKI … Continue reading

Posted in Uncategorized | Leave a comment

LDAPS: Combining Private and Public Key for 3rd Party Certs

After receiving the crt file from 3rd party CA, using the Certificates snap-in will not properly combine the private key with the public cert issued the 3rd party CA.  So, you will find that you do not have the option … Continue reading

Posted in Active Directory | Leave a comment

IE Zero Day Exploit

A compilation of information about the IE zero day exploit used to hack Google and other companies:   Microsoft Security Advisory (979352) KB article 979352 – Provides a tool for enablng or disabling software DEP KB article 875352 – Description of Data … Continue reading

Posted in Security | Leave a comment

AD: Find and Check Names… What’s the Difference?

  What is the difference between Find and "Check Names" capabilities in Active Directory Users and Computers?   You normally use "Check Names" when adding members to a group (Members) or  modifying user’s group membership (MemberOf tab).  We needed to understand the … Continue reading

Posted in Active Directory | Leave a comment

AD: Logging all LDAP searches in AD

Here are the steps to follow if you would like your domain controller to log all LDAP searches in the Directory Service log.  This is very useful when troubleshooting LDAP connections and  searches performed by your clients or applications against … Continue reading

Posted in Active Directory | Leave a comment

TS: Locking Down Terminal Servers

Some whitepapers…   http://www.microsoft.com/downloads/thankyou.aspx?familyId=7f272fff-9a6e-40c7-b64e-7920e6ae6a0d&displayLang=en http://support.microsoft.com/kb/278295

Posted in Computers and Internet | Leave a comment