Active Directory Delegated Permissions (View/Remove)

Active Directory (AD) delegation is critical part of many organizations’ IT infrastructure. By delegating administration, you can grant users or groups only the permissions they need without adding users to privileged groups (e.g., Domain Admins, Account Operators). Read More …

Ubuntu 18.04 – Restart network

Here are shown several ways how to restart networking from command line as well as from Graphical User Interface (GUI) on Ubuntu 18.04 Bionic Beaver distribution. Read More …

SQL Server – Creating linked server in SQL Server Management Studio

In SQL Server environments the linked server functionality is commonly used to connect to another (remote) database or file (Xls, CVX) using SQL Server Management Studio (SSMS) and access and use the remote data and objects. Read More …

Microsoft Active Directory Cached Credentials

On Microsoft Active Directory environments, Cached credentials allow a user to access machine resources when a domain controller is unavailable. After a successful domain logon, a form of the logon information is cached. Later, a user can log on to the computer by using the domain account, even if the domain controller that authenticated the user is unavailable. Because the user has already been authenticated, Read More …

Windows Server 2016 – Disk and Share quorum members (Failover Clustering)

Let’s begin by saying and focus that computer clusters (Windows-based) require 3 or more voting member systems to be stable. A failover cluster is a group of independent servers which work collaboratively to ensure high availability and scalability for workloads such as File Server, Exchange, SQL, and Virtual Machines. Read More …

Microsoft SQL Server – TCP Port vs TCP Dynamic Ports

The default instance of SQL Server will listen on port 1433 (unless you’ve changed it to something else). However, by default, named instances will use a dynamic port, and SQL Server Browser will determine which port has been allocated and direct traffic accordingly. Read More …

Windows Server 2016 – Disable Internet Explorer Enhanced Security Configuration

In most Windows Server systems, Enhanced Security Configuration (IE ESC) is designed to protect a server from dangerous websites capable to infect system with malware. When this mode is enabled (it is by default) you will need to add each website you want to see to the Trusted Sites Zone to open all its content in IE. Read More …

Powershell – Find and Add DNS Record Permissions

Organizations using Active Directory for their DNS service should take advantage of Windows PowerShell to manage bulk permission changes. This Read More …