Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Restrict and report logon hours for Active Directory accounts

For security purposes, it may be beneficial to restrict Active Directory account logins to regular working hours. These logon times can be configured using the calendar widget in Active Directory Users and Computers (ADUC). However, PowerShell provides a more efficient and flexible alternative, particularly because it offers reporting capabilities that the graphical interface does not.

Source

Configure DNSSEC on Windows Server

DNSSEC is a security standard that protects the Domain Name System by ensuring only authorized servers can respond to DNS queries. Microsoft's DNS server has supported DNSSEC zone signing for some time. However, to take full advantage of DNSSEC, client systems must also be configured, typically via Group Policy, to request authentic responses.

Source

How to update multiple Hyper-V VMs offline

In environments with multiple VMs running the same Windows version, powering down the Hyper-V VMs during a maintenance window is usually the most efficient way to update them offline. This involves mounting the virtual disk and installing updates through PowerShell. This approach also benefits VMs that have been powered off for an extended period. Instead of starting them in an outdated and potentially vulnerable state, you can apply critical security updates in advance.

Source

Upgrade laptop storage: Clone NVMe / SSD with Clonezilla

Many laptops come with just one M.2 slot, making storage upgrades challenging. Rather than adding an SSD, you have to replace the current one. This operation involves connecting the new SSD externally and booting the system via USB to transfer data. The free open-source tool Clonezilla provides a dedicated feature to simplify this process.

Source

Manage Microsoft PowerToys using Group Policy

Standard users can install Microsoft PowerToys without requiring administrative privileges, which may be undesirable in managed environments. However, certain tools from the PowerToys suite might be beneficial for specific users. Group Policy allows administrators to control which utilities are available.

Source

Limit logon for users and services with Active Directory authentication policies

By default, Active Directory imposes limited restrictions on the protocols or devices a user or service can use to log in. You can implement authentication policies and enforce specific limitations and restrictions to enhance login security. Active Directory offers several methods to disable outdated protocols, such as NTLMv1, or to restrict user logins to particular workstations. This can be achieved through various Group Policy settings, and the Protected Users group automatically enforces a set of security restrictions.

Source

Secure privileged Active Directory accounts using the Protected Users group

Since Windows Server 2012 R2, Active Directory (AD) has included a built-in global security group called Protected Users, designed to enhance the security of its members through predefined authentication policies. Before adding accounts to this group, it is essential to review the necessary prerequisites and monitor related events to ensure smooth implementation.

Source

Add icons to Windows 11 Start with Group Policy

With Windows 11, Microsoft has not only changed the appearance of the Start menu but also its technical underpinnings. However, the Group Policy settings for configuring Start have not been updated. While it remains possible to add icons using Group Policy Objects (GPO), you must accept some limitations.

Source

Analyze memory consumption of Hyper-V VMs

Memory is often one of the most constrained resources on a Hyper-V host, ultimately determining the maximum number of virtual machines (VMs) it can support. As such, accurately assessing the RAM requirements of VMs is critical for effective capacity planning. These requirements can be evaluated using performance counters available in Perfmon.

Source

Windows 11 Zero Trust DNS (ZTDNS): Only permit outbound connections via protective DNS

The Domain Name System (DNS) is susceptible to attacks that redirect clients to malicious services. Technologies like DNSSEC, DoH, and DoT have been developed to mitigate such threats. In addition, Microsoft introduced Zero Trust DNS (ZTDNS) in Windows 11, which blocks all connections unless a trusted and secure DNS server has resolved their IP addresses.

Source

❌