NTLM Migration to Kerberos
Comprehensive guide to migrate from NTLM to Kerberos in Active Directory. Learn how to audit, analyze dependencies, apply GPOs, and ensure a smooth transition.
Tutoriels IT & Windows Server – Active Directory, Exchange, PowerShell | Rached Chader
Bienvenue sur Chader.fr, votre site de référence pour les tutoriels Microsoft et Windows Server.
Comprehensive guide to migrate from NTLM to Kerberos in Active Directory. Learn how to audit, analyze dependencies, apply GPOs, and ensure a smooth transition.
I migrate a DC step by step: preparation (name/IP/DNS), promotion of NEWDC (DNS+GC), FSMO transfers, PDC NTP, SYSVOL migration to DFSR, then decommissioning of OLDDC. We prioritize the GUI and validate each step with repadmin/dcdiag and DNS SRV checks.
CopyCraft is a free graphical interface for Robocopy. Follow this tutorial to secure your data transfers with logs and NTFS permissions.
When you log in to a computer that is running domain-joined Windows, and you receive the message “Error The trust relationship between this workstation and the primary domain has failed”.
Data Loss Prevention “DLP” helps organizations comply with industry regulations and protect sensitive information. It also prevents inadvertent disclosure. The sensitive information you need to prevent leaks outside your organization includes financial data, such as credit card numbers, social security numbers, or medical records. With a DLP policy, you can identify, track, and protect sensitive information in Office and Microsoft 365.
Cannot delete a database in Exchange 2016
“This mailbox database contains one or more mailboxes, mailbox plans, archive mailboxes, public folder mailboxes or arbitration mailboxes, audit mailboxes. To get a list of all mailboxes in this database, run the Get-Mailbox -Database
Storage Replica is a Windows Server technology that enables the replication of volumes between servers or clusters for disaster recovery. It also allows you to create stretch failover clusters that span two sites, with all nodes in sync.
Here are some privacy settings that allow you to limit the communication of your information to the publisher and its partners.
This will go through the use of Group Policy Objects, which we will discover in this article.
The article was inspired by the recommendations of the National Agency for Information Systems Security, as well as my experience.