๐ Active Directory Migrations to AWS 1. Common Migration Scenarios 2. Migration Steps A. Assessment & Planning B. Prepare AWS Environment C. Deploy AD in AWS D. Data Migration E. Testing and Validation F. FSMO Role Transfer & Cleanup ๐งฉ Active Directory Consolidations Use Cases Tools & Strategies AWS Tip:…
Metadata cleanup in Active Directory
Performing metadata cleanup in Active Directory is necessary when a domain controller (DC) has been forcefully removed or decommissioned incorrectly, leaving stale references in AD. This can cause replication issues and other problems. Hereโs a step-by-step guide for performing metadata cleanup in Windows Server (applies to Server 2012 and later,…
Which user deleted a file on an Active Directory-integrated file server ?
To determine which user deleted a file on an Active Directory-integrated file server, you need to have auditing enabled beforehand. Hereโs a step-by-step to investigate file deletions using Windows File Server Auditing: โ Prerequisites: Enable Auditing If not already done, follow these steps (you wonโt see past events unless auditing…
Transfer & SEIZE FSMO Roles
Transferring and seizing FSMO (Flexible Single Master Operations) roles are critical tasks in Active Directory (AD) management. Here’s how to transfer and seize FSMO roles using both GUI and PowerShell/NTDSUTIL, depending on the situation. ๐ FSMO Roles Overview There are 5 FSMO roles: โ Transfer FSMO Roles (Graceful Method) Use…
Detailed information on “DPDPA, GDPR, HIPAA, PCI DSS”
1. DPDPA (Data Protection and Digital Privacy Act) The DPDPA is an evolving framework designed to protect individuals’ personal data in a digital world. While specific legislation might vary by country or region, the act typically focuses on strengthening data privacy protections, ensuring transparency around data collection and processing, and…
Outlook keeps prompting you for your Gmail password during SMTP setup
1. Enable IMAP/SMTP in Gmail Settings 2. Use App Password (if 2-Step Verification is enabled) If you use 2-Step Verification in Gmail: Without this, Gmail will reject access attempts even if the password is correct. 3. SMTP & IMAP Settings for Gmail Make sure these settings are correct in Outlook:…
How to select which machine needs to be deploy for which environment in azure
Selecting which machine (VM type/size) to deploy for a given environment (Dev, Test, QA, UAT, Prod) in Azure depends on a few key factors like performance, cost, stability requirements, scalability, and compliance. 1. Environment Goals Environment Goal Dev Fast iteration, low cost Test Match Prod to some extent, but cost-effective…
Azure subscription
๐น What is an Azure Subscription? An Azure subscription is a logical container used to provision resources in Microsoft Azure. It holds the details of all the resources like virtual machines (VMs), databases, and storage accounts, and governs billing, quotas, and access control. ๐น Azure Subscription Structure Component Description Tenant…
SoftEther VPN Server โ Default Ports to Open
To run a SoftEther VPN Server properly, youโll need to ensure specific ports are open both on your firewall and ISP (or NAT router). Here’s is the list of the default and recommended ports: ๐ SoftEther VPN Server โ Default Ports to Open Protocol Port Purpose TCP 443 HTTPS VPN…
Configure Softnet ethernet VPN server on Azure step by step
o set up a SoftEther VPN Server on Azure, using a Windows VM, here’s a complete step-by-step guide to get it running securely and efficiently. ๐ ๏ธ Overview ๐ง Prerequisites ๐งฑ Step-by-Step Setup โ Step 1: Create a Windows VM in Azure โ Step 2: Connect to the VM โ Step…
VPN server in Azure
Setting up a VPN server in Azure that supports secure access for employees, vendors, and customers requires a carefully planned architecture to address different access levels, security boundaries, and scalability. Here’s a solid approach with Azure-native and custom options, along with a proposed build. ๐ Goal: ๐งฑ Solution Overview: Option…