-
Recent Posts
Recent Comments
Arden on Missing HomeMTA attribute Archives
Categories
Meta
Author Archives: itwanderer
Enabling Legal Hold on Exchange 2010
How do you enable legal hold on a mailbox? Pretty simple, right? There are multiple ways to do it as can be seen here: Place a Mailbox on Legal Hold Is there another way to do this? However, if for … Continue reading
Posted in Uncategorized
Leave a comment
Useful Utilities
This is a living document thet will list useful tools Meeting/Videoconference join.me – free basic, organizer can share desktop, but not attendees. making other attendees as presenter part of pro, paid package meetingburner.com – free accounts includes 15 attendees, organizer … Continue reading
Posted in Uncategorized
Leave a comment
Powershell – References
E-Book by Dr. Tobias Weltner
Posted in References, Scripting
Leave a comment
Tread Lightly – Kerberos Encryption Types
Or better yet, make sure you know what you are doing before you make any changes. Otherwise, you could be in for a world of hurt. Why all the fuss? One of the major changes with Windows 7 and Windows … Continue reading
Posted in Active Directory
Leave a comment
Importing a PFX File Using CertUtil.Exe
Instead of using the GUI (Certificate Services Snapin), you can use certutil.exe to import a pfx file (private and public key combined). certutil.exe -importPFX pfxfilename You’ll get prompted for the password. More information from the Windows PKI … Continue reading
Posted in Uncategorized
Leave a comment
LDAPS: Combining Private and Public Key for 3rd Party Certs
After receiving the crt file from 3rd party CA, using the Certificates snap-in will not properly combine the private key with the public cert issued the 3rd party CA. So, you will find that you do not have the option … Continue reading
Posted in Active Directory
Leave a comment
IE Zero Day Exploit
A compilation of information about the IE zero day exploit used to hack Google and other companies: Microsoft Security Advisory (979352) KB article 979352 – Provides a tool for enablng or disabling software DEP KB article 875352 – Description of Data … Continue reading
Posted in Security
Leave a comment
AD: Find and Check Names… What’s the Difference?
What is the difference between Find and "Check Names" capabilities in Active Directory Users and Computers? You normally use "Check Names" when adding members to a group (Members) or modifying user’s group membership (MemberOf tab). We needed to understand the … Continue reading
Posted in Active Directory
Leave a comment
AD: Logging all LDAP searches in AD
Here are the steps to follow if you would like your domain controller to log all LDAP searches in the Directory Service log. This is very useful when troubleshooting LDAP connections and searches performed by your clients or applications against … Continue reading
Posted in Active Directory
Leave a comment