New features in Active Directory Domain Services in Windows Server 2012, Part 17: LDAP Enhancements

With all the fancy features in Active Directory, I almost tend to forget it was originally an x.500 directory services, offering LDAP connectivity. Although today this is less evident, LDAP is intensively used under the hood for directory connectivity. Alongside the older RPC-based protocols it is used for over 90% of the communication to the … Continue reading "New features in Active Directory Domain Services in Windows Server 2012, Part 17: LDAP Enhancements"

Remote Server Administration Tools for Windows 8

If you want to remotely manage a Windows Server-based infrastructure  from a Windows-based workstation, you will need the Remote Server Administration Tools (RSAT). If you want to use Windows 8 to manage all the new Windows Server 2012 stuff remotely, you will need the Remote Server Administration Tools for Windows 8. The Remote Server Administration … Continue reading "Remote Server Administration Tools for Windows 8"

Reusing a Role Installation XML file in Windows Server 2012 to install the Active Directory Domain Services Role

Ranging from multi-server management to over 2400 PowerShell Cmdlets, Windows Server 2012 delivers on the promise of standards-based management and automation capabilities. Part of the new Domain Controller Promotion process is installing the Active Directory Domain Services role onto a stand-alone or member server. This activity needs to be completed before the new Active Directory … Continue reading "Reusing a Role Installation XML file in Windows Server 2012 to install the Active Directory Domain Services Role"

New features in Active Directory Domain Services in Windows Server 2012, Part 15: Deferred Index Creation

As already mentioned in the previous blog post on RID Improvements in Windows Server 2012, Active Directory environments are sometimes cathedrals of Microsoft technology; they’re big, they’re old and a lot of effort has been put into them to get them into the shape they’re in today.

New features in Active Directory Domain Services in Windows Server 2012, Part 14: RID improvements

Active Directory is a proven technology that has been around since Windows 2000 Server. Some Active Directory environments have been around since that time, while some others have even been around ever longer and started their lives as Windows NT 3.x or Windows NT 4.0 domains. With directory environments growing older, some limits of these … Continue reading "New features in Active Directory Domain Services in Windows Server 2012, Part 14: RID improvements"

New features in Active Directory Domain Services in Windows Server 2012, Part 13: Domain Controller Cloning

In the previous blogpost in this series I discussed virtualization-aware Active Directory. With the use of the newly introduced VM-GenerationID, virtual Domain Controllers can now detect when they are reverted back to an earlier state or when their virtual hard disk is reused. Let’s look into the latter scenario a bit. In Windows Server 2008 … Continue reading "New features in Active Directory Domain Services in Windows Server 2012, Part 13: Domain Controller Cloning"

New features in Active Directory Domain Services in Windows Server 2012, Part 12: Virtualization-safe Active Directory

In organizations with different teams being responsible for Active Directory management and management of the virtualization/hypervisor layer, it is not uncommon to seriously damage contents in Active Directory with snapshots. Virtualization Admins can easily cripple Active Directory by reverting a snapshot of a virtual Active Directory Domain Controller, since Active Directory, currently, is not virtualization-aware.

New features in Active Directory Domain Services in Windows Server 2012, Part 11: Kerberos Armoring (FAST)

A whole new security feature in Active Directory Domain Services in Windows Server 2012 listens to the name Flexible Authentication Secure Tunneling (FAST). This new features solves common security problems with Kerberos and also makes sure clients do not fall back to less secure legacy protocols or weaker cryptographic methods.