Skip to content

MAHARJAN-BINOD

"Innovate, Implement, Inspire."

Menu
    • Active-Directory (AD) – MAIN
      • ACTIVE DIRECTORY CERTIFICATE SERVICES
      • ACTIVE DIRECTORY DOMAIN SERVICES
      • AD Security Hardening
      • AD-PowerShellScript
      • AZURE-ADCONNECT
      • DOMAIN NAME SERVER (DNS)
      • FILE-SERVER
      • GPOs
      • GROUP POLICY MANAGEMENT
    • Azure (AZ) – MAIN
      • Azure Communication Service
      • Azure-Site-Recovery
    • Blog
    • Exchange – MAIN
      • Exchange-Server-2019-CU13
      • Exchange-Server-2019-CU15
      • Exchange-Server-SE
      • MFA-FOR-OWA
    • Group Policy Series
    • MAHARJAN-BINOD
    • Microsoft365 – MAIN
      • M365-Intune
      • SharePoint-Online (SP-Online)
    • My Blogs
    • Office-Online-Server (OOS)
    • Windows-Server-Update-Service (WSUS)

ACTIVE-DIRECTORY

ACTIVE-DIRECTORY / AD-SECURITY

The Domain Controller Death Trap: Hardening the Print Spooler in 2026

Active Directory Vulnerability: The Print Spooler on Domain Controllers Posted on May 14, 2026 | By Security Research Team Even in 2026, the Print Spooler remains a Tier-0 attack vector. …

ACTIVE-DIRECTORY / AD-SECURITY

AD Security Series Part 1: How to Audit and Fix Kerberoasting & AS-REP Roasting

Introduction Start by explaining that attackers don’t always need to “break in”—sometimes they just “ask.” “In Active Directory, certain accounts are configured in a way that allows any authenticated user …

GPO

BitLocker Series Part 5: Automating Recovery Password Cleanup via PowerShell

Introduction Over time, a single computer object in Active Directory can accumulate multiple BitLocker recovery GUIDs. This happens during OS reinstalls, manual decryption/re-encryption cycles, or when “Backup to AD” policies …

GPO

BitLocker Series Part 4: Moving from Auto-Unlock to Manual Security

Introduction In an era where physical device theft and sophisticated “cold boot” attacks are rising, relying on transparent encryption is no longer enough for high-stakes environments. While BitLocker’s “Auto-Unlock” features …

GPO

BitLocker GPO Series | Part 3: Testing Persistence, Portability, and New Hardware

Introduction In Part 2, we secured our internal fixed drives. But a common question from IT managers is: “What happens to the policy when the hardware changes?” In this post, …

GPO

BitLocker GPO Series | Part 2: Automating Protection for Fixed Data Drives

Introduction In the first part of this series, we secured the Operating System drive. However, in many enterprise environments, workstations are equipped with secondary internal drives for storage. Leaving these …

GPO

BitLocker GPO Series | Part 1: Establishing the Security Foundation

Introduction In an era where data breaches can define the reputation of an organization, securing “data at rest” is no longer optional—it is a baseline requirement. For many IT administrators, …

AD-DS / DNS

How to Perform Active Directory DNS Backup and Restore (Step-by-Step Guide)

Managing DNS in an Active Directory environment is critical for domain functionality. Since DNS records are tightly integrated with AD DS, ensuring a reliable backup and restore strategy is essential …

ACTIVE-DIRECTORY

⭐ Installing Azure AD Connect (Step-by-Step Guide for Beginners)

Your First Hybrid Identity Setup Once you understand what Azure AD Connect is and have checked all prerequisites, the next step is to install it. This beginner-friendly guide walks you …

ACTIVE-DIRECTORY

⭐ Prerequisites Before Installing Azure AD Connect

A Simple Guide for Beginners Before you install Azure AD Connect, you must make sure that your environment meets the basic requirements. This ensures a smooth installation and prevents sync …

Posts navigation

Older posts
Copyright © 2026 MAHARJAN-BINOD. All rights reserved.