Skip to content

MAHARJAN-TECH

"Innovate, Implement, Inspire."

Menu
    • Active Directory (AD)
      • ACTIVE DIRECTORY CERTIFICATE SERVICES
      • ACTIVE DIRECTORY DOMAIN SERVICES
      • AZURE-ADCONNECT
      • DOMAIN NAME SERVER (DNS)
    • ASR
    • Azure (AZ)
    • Blog
    • FILE-SERVER
    • GROUP POLICY MANAGEMENT
    • Group Policy Series
    • Home
    • Microsoft Exchange
    • MICROSOFT EXCHANGE – SINGLE SERVER
    • Microsoft365 (M365)
      • MS-Intune
    • MS-Exchange
    • My Blogs
    • Office-Online-Server (OOS)
    • SHAREPOINT-ONLINE (SP-Online)
    • Why Read My Blog?
    • WINDOWS-SERVER
    • WSUS-SERVER

binod.maharjan

ACTIVE-DIRECTORY

Management Part 2: GPO vs. Intune — The Policy Shift

If Active Directory is the “Constitution” of our city, then Group Policy (GPO) was the set of physical laws we enforced within the city walls. But now that our citizens …

ACTIVE-DIRECTORY

Management Part 1: The End of Imaging — Microsoft Autopilot

In the previous levels, we built a beautiful, secure, and hybrid “Identity City.” But how do our citizens actually get their tools? In the old world of IT, when a …

ACTIVE-DIRECTORY

Hybrid Part 4: Cloud Hardening — The Gatekeeper (Conditional Access)

We have built the Bridge, chosen our Heartbeat, and enabled Flow with Seamless SSO. Our “Satellite Colony” is now fully functional. But there is a new danger: the Cloud is …

ACTIVE-DIRECTORY

Hybrid Part 3: Seamless SSO — The Magic of the Invisible Login

In the previous parts of Level 4, we built the bridge and decided how the cloud checks our “ID cards.” But as a Mindful Architect, we must eventually ask: Why …

ACTIVE-DIRECTORY

Hybrid Part 2: PHS vs. PTA — Choosing the Right Heartbeat

In Part 1, we built the Bridge (Entra Connect) between our physical City Hall and our Satellite Colony in the cloud. But now we face a crucial architectural decision: Who …

ACTIVE-DIRECTORY

Hybrid Part 1: The Bridge to the Cloud — Understanding Entra ID Connect

For three levels, we have perfected our on-premises “City Hall.” But today, the world works differently. Your citizens (users) want to access their files from home, on their phones, and …

ACTIVE-DIRECTORY

Security Part 5: The Red Team Mindset — Using Honeypots and Decoys

We have spent this series hardening the gates, watching the logs, and securing the keys. But in the world of modern cybersecurity, a “Mindful Architect” must accept a difficult truth: …

ACTIVE-DIRECTORY

Security Part 4: The Silent Observer — Mastering Advanced Auditing

We have built the Tiered Fortress, enforced Temporary Power, and closed the Legacy Back Doors. But even in the most secure city, things happen. A gate is opened. A file …

ACTIVE-DIRECTORY

Security Part 3: Closing the Back Doors — Securing Legacy Protocols

In the first two parts of this series, we built a Tiered Fortress and mastered Temporary Power. But even a fortress with high walls is vulnerable if there are old, …

ACTIVE-DIRECTORY

Security Part 2: JIT & JEA — Power That Disappears

In Part 1, we built the walls of our Tiered Fortress. But even inside a fortress, there is a risk. If a “Guard” has keys to the armory 24 hours …

Posts navigation

Older posts
Newer posts
Copyright © 2026 MAHARJAN-TECH – OnePress theme by FameThemes