Skip to content

MAHARJAN-TECH

"Innovate, Implement, Inspire."

Menu
    • Active Directory (AD)
      • ACTIVE DIRECTORY CERTIFICATE SERVICES
      • ACTIVE DIRECTORY DOMAIN SERVICES
      • AZURE-ADCONNECT
      • DOMAIN NAME SERVER (DNS)
    • ASR
    • Azure (AZ)
    • Blog
    • FILE-SERVER
    • GROUP POLICY MANAGEMENT
    • Group Policy Series
    • Home
    • Microsoft Exchange
    • MICROSOFT EXCHANGE – SINGLE SERVER
    • Microsoft365 (M365)
      • MS-Intune
    • MS-Exchange
    • My Blogs
    • Office-Online-Server (OOS)
    • SHAREPOINT-ONLINE (SP-Online)
    • Why Read My Blog?
    • WINDOWS-SERVER
    • WSUS-SERVER

binod.maharjan

ACTIVE-DIRECTORY

Forensics Part 4: The Digital Post-Mortem — Healing the City

We have found the Artifacts, analyzed the Ghosts, and reconstructed the Timeline. The intruder has been identified and their path is clear. But a Mindful Architect knows that the job …

ACTIVE-DIRECTORY

Forensics Part 3: Timelining the Intrusion — Connecting the Shadows

In the first two parts of our Forensics series, we collected Artifacts (Logs) and analyzed Ghosts (RAM). But right now, we just have a pile of evidence. To catch an …

ACTIVE-DIRECTORY

Forensics Part 2: The Memory Trace — Analyzing the Ghosts in the RAM

In our first archaeology lesson, we looked at Artifacts (logs) left on the hard drive. But modern intruders are clever. They know that files leave footprints, so they often choose …

ACTIVE-DIRECTORY

Forensics Part 1: The Artifacts of Truth — Beyond Standard Logging

In our previous levels, we built a city and even practiced attacking it. But if a real intruder entered your city today, would you actually know what they did? Standard …

MAHARJAN-BINOD

The Dojo Part 4: The First Strike — Capturing the Ghost

We have built the Dojo, created the flaws, and equipped our tools. Now, the time for theory is over. It is time for the First Strike. In this simulation, we …

ACTIVE-DIRECTORY / MAHARJAN-DEFAULT

The Dojo Part 3: The Thief’s Perspective — Seeing Through Kali

In the previous parts of the Dojo, we built our Sanctuary and populated it with Vulnerabilities. Now, it is time to put on the mask of the intruder. To be …

ACTIVE-DIRECTORY

The Dojo Part 2: The Vulnerable City — Designing the Flaws

In Part 1, we built the Sandboxed Sanctuary—the physical room for our Dojo. But a warrior cannot practice with a straw man that never moves. To learn how to hunt …

ACTIVE-DIRECTORY

The Dojo Part 1: The Sandboxed Sanctuary — Building Your Virtual Lab

For five levels, we have been building and managing a “Digital City.” But a true Mindful Architect knows that a fortress is only as strong as the pressure it can …

MAHARJAN-BINOD

Management Part 4: The Art of the Remote Wipe — Securely Ending the Journey

In the lifecycle of every citizen’s tool, there comes a time for a “Clean Break.” Perhaps a laptop has reached the end of its three-year life, perhaps a citizen is …

ACTIVE-DIRECTORY

Management Part 3: Compliance & Integrity — The New Digital Health Standard

In the old days of the physical city, we relied on the “Castle Walls.” If you were inside the building and plugged into the wall, we trusted your computer. But …

Posts navigation

Older posts
Copyright © 2026 MAHARJAN-TECH – OnePress theme by FameThemes