Sean Metcalf

I improve security for enterprises around the world working for Read the About page (top left) for information about me. :)

Author's posts

Apr 27

AD Reading: Active Directory Core Concepts

The following are extremely useful resources for understanding Active Directory Core Concepts. Core Directory Concepts & Key Items MCM Core AD Internals Core Concepts of Active Directory Domain Services o   Attributes o   Containers and Leaves o   Object Names and Identities o   Naming Contexts and Directory Partitions o   Domain Trees o   Forests o   Active Directory Servers …

Continue reading

Apr 27

Hyper-V 2012 Resources

I have been researching Hyper-V 2012 quite a bit over the past couple of months. Here are some of the more useful links: Hyper-V Wikipedia article Microsoft Hyper-V Page Microsoft Hyper-V Blog Building a Private Cloud VM Compute Foundation with the FREE Hyper-V Server 2012 Deploy Hyper-V over SMB Creating a Windows Server 2012 Failover …

Continue reading

Mar 19

Intel vPro Technology Security

In every modern (recent) Intel processor, there is a remote access Hardware Secrets posted: Intel’s vPro technology provides IT managers with a collection of security and manageability features, including remote access to the PC independent of the state of the operating system or that of the computer’s power. The newest vPro processors include an identity …

Continue reading

Feb 28

KMS Part 2

This is an addendum post to the original KMS info post with a bunch of useful info I gathered recently. Useful KMS and Windows activation commands: Change Windows 2008 R2 license key type from Retail to KMS activated: Slmgr /ipk 489J6-VHDMP-X63PK-3K798-CPX3Y Clear cached KMS host: Slmgr.vbs /ckms Disable KMS host caching: Slmgr.vbs /ckhc Flush local …

Continue reading

Feb 23

Security Considerations for Active Directory (AD) Trusts

  TechNet has an article on the Security Considerations for Active Directory (AD) Trusts. This is a must read to fully understand the issues with the security implications of trust configurations. Potential Threats to Interforest Trusts Security Settings for Interforest Trusts Minimum Administrative Credentials for Securing Trusts Trust Security and Other Windows Technologies Related Information …

Continue reading

Feb 15

Active Directory Security Group Resources

Laura Robinson (Microsoft) has 2 posts which are excellent resources when working on your Active Directory delegation model. These posts focus on the concept of an “Admin-Free Active Directory” meaning that there are no accounts in the powerful AD groups: Enterprise Admins, Domain Admins, Administrators, & Schema Admins. The posts also list all of the …

Continue reading

Feb 13

Microsoft Key Management Server (KMS) Details

KMS Introduction The Microsoft Key Management Server (KMS) is part of the Microsoft Volume Activation 2.0 solution managing Windows OS activation keys and performs activation for supported clients automatically. Starting with Windows Server 2008 & Windows Vista, Microsoft switched to an online activation system where every Windows OS requires activation.  KMS shifts the activation requirement …

Continue reading

Feb 01

Microsoft KMS Server

The KMS Server is the Key Management Server for Microsoft product activation, primarily OS activation. An organization can configure a KMS Server to service all activation requests in the enterprise.  In order for the KMS Server to activate Windows 7, the easiest method is to install KMS on a Windows 2008 R2 server (Windows 2003 …

Continue reading

Jul 03

Using Group Policy Preferences for Password Management = Bad Idea

Using Group Policy Preferences for Password Management = Bad Idea OR “How to Get Your Network Owned in Several Simple Steps” One of my customers recently needed to change the local administrator password on several hundred Windows 7 workstations and was trying to determine the best method: PowerShell script or Group Policy Preferences. The easy …

Continue reading

Nov 17

Windows 2012 RID Management

While “1 Billon RIDs should be enough for anyone,” there are scenarios where a domain could run out of RIDs. This is a “very bad thing” since every security principal requires a RID for creation (Domain SID + RID = security principal SID).  One can check the number of RIDs remaining in a domain through …

Continue reading