Sean Metcalf

I improve security for enterprises around the world working for TrustedSec & I am @PyroTek3 on Twitter. Read the About page (top left) for information about me. :) https://adsecurity.org/?page_id=8

Author's posts

AD Reading: Active Directory Client Interaction

The following are extremely useful resources for understanding the Active Directory Client Interaction. Client Interaction Locating Active Directory Servers o   Domain Controller Name Registration o   SRV Resource Records o   Domain Controller Location Process o   Finding a Domain Controller in the Closest Site o   Types of Locators IP/DNS DC Locator Algorithm(This is also a great general …

Continue reading

AD Reading: Active Directory Backup and Disaster Recovery

The following are extremely useful resources for understanding the Active Directory Backup and Disaster Recovery. Backup and Disaster Recovery AD DS Backup and Recovery Step–by–Step Guide o   What’s New in AD DS Backup and Recovery? o   Known Issues for AD DS Backup and Recovery o   Best Practices for AD DS Backup and Recovery o   General …

Continue reading

AD Reading: Active Directory Authentication & Logon

The following are extremely useful resources for understanding the Active Directory Authentication & Logon. Authentication & Logon Logon and Authentication Technologies o   Digest Authentication Technical Reference o   Interactive Logon Technical Reference o   Kerberos Authentication Technical Reference What Is Kerberos Authentication? How the Kerberos Version 5 Authentication Protocol Works Kerberos Authentication Tools and Settings o   TLS/SSL …

Continue reading

AD Reading: Active Directory Database

The following are extremely useful resources for understanding the Active Directory Database. AD Database How the Data Store Works o   Data Store Architecture o   Data Store Protocols o   Data Store Interfaces o   Data Store Logical Structure o   Data Store Physical Structure o   Data Store Processes and Interactions o   Network Ports Used by the Data Store …

Continue reading

AD Reading: Active Directory Core Concepts

The following are extremely useful resources for understanding Active Directory Core Concepts. Core Directory Concepts & Key Items MCM Core AD Internals Core Concepts of Active Directory Domain Services o   Attributes o   Containers and Leaves o   Object Names and Identities o   Naming Contexts and Directory Partitions o   Domain Trees o   Forests o   Active Directory Servers …

Continue reading

Hyper-V 2012 Resources

I have been researching Hyper-V 2012 quite a bit over the past couple of months. Here are some of the more useful links: Hyper-V Wikipedia article Microsoft Hyper-V Page Microsoft Hyper-V Blog Building a Private Cloud VM Compute Foundation with the FREE Hyper-V Server 2012 Deploy Hyper-V over SMB Creating a Windows Server 2012 Failover …

Continue reading

Intel vPro Technology Security

In every modern (recent) Intel processor, there is a remote access Hardware Secrets posted: Intel’s vPro technology provides IT managers with a collection of security and manageability features, including remote access to the PC independent of the state of the operating system or that of the computer’s power. The newest vPro processors include an identity …

Continue reading

KMS Part 2

This is an addendum post to the original KMS info post with a bunch of useful info I gathered recently. Useful KMS and Windows activation commands: Change Windows 2008 R2 license key type from Retail to KMS activated: Slmgr /ipk 489J6-VHDMP-X63PK-3K798-CPX3Y Clear cached KMS host: Slmgr.vbs /ckms Disable KMS host caching: Slmgr.vbs /ckhc Flush local …

Continue reading

Security Considerations for Active Directory (AD) Trusts

  TechNet has an article on the Security Considerations for Active Directory (AD) Trusts. This is a must read to fully understand the issues with the security implications of trust configurations. Potential Threats to Interforest Trusts Security Settings for Interforest Trusts Minimum Administrative Credentials for Securing Trusts Trust Security and Other Windows Technologies Related Information …

Continue reading

Active Directory Security Group Resources

Laura Robinson (Microsoft) has 2 posts which are excellent resources when working on your Active Directory delegation model. These posts focus on the concept of an “Admin-Free Active Directory” meaning that there are no accounts in the powerful AD groups: Enterprise Admins, Domain Admins, Administrators, & Schema Admins. The posts also list all of the …

Continue reading

Load more