Skip to content

MAHARJAN-TECH

"Innovate, Implement, Inspire."

Menu
    • Active Directory (AD)
      • ACTIVE DIRECTORY CERTIFICATE SERVICES
      • ACTIVE DIRECTORY DOMAIN SERVICES
      • AZURE-ADCONNECT
      • DOMAIN NAME SERVER (DNS)
    • ASR
    • Azure (AZ)
    • Blog
    • Exchange-Server-2019-CU13
    • Exchange-Server-2019-CU15
    • Exchange-Server-SE
    • FILE-SERVER
    • GPOs
    • GROUP POLICY MANAGEMENT
    • Group Policy Series
    • Home
    • Microsoft Exchange
    • Microsoft365 (M365)
      • MS-Intune
    • MS-Exchange
    • My Blogs
    • Office-Online-Server (OOS)
    • SHAREPOINT-ONLINE (SP-Online)
    • Why Read My Blog?
    • WINDOWS-SERVER
    • WSUS-SERVER

GPO

Group Policy Objects

GPO

BitLocker Series Part 5: Automating Recovery Password Cleanup via PowerShell

Introduction Over time, a single computer object in Active Directory can accumulate multiple BitLocker recovery GUIDs. This happens during OS reinstalls, manual decryption/re-encryption cycles, or when “Backup to AD” policies …

GPO

BitLocker Series Part 4: Moving from Auto-Unlock to Manual Security

Introduction In an era where physical device theft and sophisticated “cold boot” attacks are rising, relying on transparent encryption is no longer enough for high-stakes environments. While BitLocker’s “Auto-Unlock” features …

GPO

BitLocker GPO Series | Part 3: Testing Persistence, Portability, and New Hardware

Introduction In Part 2, we secured our internal fixed drives. But a common question from IT managers is: “What happens to the policy when the hardware changes?” In this post, …

GPO

BitLocker GPO Series | Part 2: Automating Protection for Fixed Data Drives

Introduction In the first part of this series, we secured the Operating System drive. However, in many enterprise environments, workstations are equipped with secondary internal drives for storage. Leaving these …

GPO

BitLocker GPO Series | Part 1: Establishing the Security Foundation

Introduction In an era where data breaches can define the reputation of an organization, securing “data at rest” is no longer optional—it is a baseline requirement. For many IT administrators, …

AD-DS / GPO

🕒 Manually Configuring NTP Server in a Primary Domain Controller (PDC Emulator)

📝 Introduction In any Active Directory environment, accurate time synchronization is critical for Kerberos authentication, group policy processing, and replication between domain controllers. The PDC Emulator in the forest root …

AD-CS / GPO

🔐 Fix: RDP Certificate Warning – “The certificate is not from a trusted certifying authority”

✨ Observation While connecting to a server using Remote Desktop Protocol (RDP) via IP address, a warning appears: ⚠️ “The identity of the remote computer cannot be verified. Do you …

GPO

🚀 Deploy Romanized Unicode Application via GPO – Step-by-Step Guide

📘 Overview In many organizations, especially those operating in Nepal, Nepali Unicode typing is essential for documentation, communication, and compliance. Manually installing Romanized Unicode on every system can be time-consuming. …

ACTIVE-DIRECTORY / GPO

Automating GPO Management with PowerShell – How I Simplify Group Policy Tasks

Once I got comfortable working with Group Policy in the GUI, I started to hit a wall when managing multiple GPOs across different OUs and domains. That’s when I discovered …

ACTIVE-DIRECTORY / GPO

Advanced Security Settings with GPO – How I Harden My Windows Environment

After getting comfortable with basic Group Policy configurations, I realized I could take things much further — especially when it comes to hardening security. Group Policy gives me the power …

Posts navigation

Older posts
Copyright © 2026 MAHARJAN-TECH – OnePress theme by FameThemes