<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Active Directory | Raving Roo</title>
	<atom:link href="https://ravingroo.com/category/active-directory/feed/" rel="self" type="application/rss+xml" />
	<link>https://ravingroo.com</link>
	<description>Chew the Fat</description>
	<lastBuildDate>Sat, 10 Oct 2020 01:29:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/ravingroo.com/wp-content/uploads/2019/06/cropped-kangaroo-silhouette2.png?fit=32%2C32&#038;ssl=1</url>
	<title>Active Directory | Raving Roo</title>
	<link>https://ravingroo.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">25842277</site>	<item>
		<title>Use WMI Filter To Apply Group Policy To IP Subnet</title>
		<link>https://ravingroo.com/1364/wmi-filter-apply-group-policy-specific-ip-subnet/</link>
					<comments>https://ravingroo.com/1364/wmi-filter-apply-group-policy-specific-ip-subnet/#respond</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Mon, 04 Jan 2016 01:13:31 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[group policy]]></category>
		<category><![CDATA[subnet]]></category>
		<category><![CDATA[tcpip.WMI]]></category>
		<category><![CDATA[WMI filter]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=1364</guid>

					<description><![CDATA[<p>Using a WMI filter, you can apply a group policy based on the client&#8217;s TCP/IP subnet. 1. In Group Policy Management, right-click the WMI Filters folder and click New. 2. Name your new WMI policy, give it a description if you wish. 3. Click the Add button, leave the Namespace at the default setting &#8220;root\CIMv2&#8221;...<br /><a class="moretag" href="https://ravingroo.com/1364/wmi-filter-apply-group-policy-specific-ip-subnet/">Read On...</a></p>
The post <a href="https://ravingroo.com/1364/wmi-filter-apply-group-policy-specific-ip-subnet/">Use WMI Filter To Apply Group Policy To IP Subnet</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/1364/wmi-filter-apply-group-policy-specific-ip-subnet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1364</post-id>	</item>
		<item>
		<title>How To Create And Manage Password Settings Objects (PSO)</title>
		<link>https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/</link>
					<comments>https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/#respond</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Wed, 23 Dec 2015 19:45:09 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[ADSI Edit]]></category>
		<category><![CDATA[attribute]]></category>
		<category><![CDATA[attribute editor]]></category>
		<category><![CDATA[Fine-grained password policy]]></category>
		<category><![CDATA[FQDN]]></category>
		<category><![CDATA[GPO]]></category>
		<category><![CDATA[group]]></category>
		<category><![CDATA[group policy]]></category>
		<category><![CDATA[object]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password policy]]></category>
		<category><![CDATA[PSO]]></category>
		<category><![CDATA[user]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=1224</guid>

					<description><![CDATA[<p><img width="2048" height="1151" src="https://ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?w=2048&amp;ssl=1 2048w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=768%2C432&amp;ssl=1 768w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=1024%2C576&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=535%2C301&amp;ssl=1 535w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?w=1960&amp;ssl=1 1960w" sizes="(max-width: 2048px) 100vw, 2048px" /></p><p>With Windows Server 2008, Microsoft introduced Fine-Grained Password policies which utilizes a new Active Directory object called Password Settings Object (PSO). These objects allow you to more easily create and assign password policies to subsets of users, albeit with a bit of an unpolished implementation method compared to the old method via group policy (GPO). If...<br /><a class="moretag" href="https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/">Read On...</a></p>
The post <a href="https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/">How To Create And Manage Password Settings Objects (PSO)</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1224</post-id>	</item>
		<item>
		<title>Windows File Share Permissions &#8211; Allow: Read, Write, Delete &#8211; Deny: List</title>
		<link>https://ravingroo.com/1150/windows-file-share-permissions-allow-read-write-delete-deny-list/</link>
					<comments>https://ravingroo.com/1150/windows-file-share-permissions-allow-read-write-delete-deny-list/#respond</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Thu, 25 Jun 2015 20:59:53 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[browse]]></category>
		<category><![CDATA[contents]]></category>
		<category><![CDATA[delete]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file permissions]]></category>
		<category><![CDATA[file share]]></category>
		<category><![CDATA[folder]]></category>
		<category><![CDATA[list]]></category>
		<category><![CDATA[permission]]></category>
		<category><![CDATA[read]]></category>
		<category><![CDATA[share]]></category>
		<category><![CDATA[write]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=1150</guid>

					<description><![CDATA[<p><img width="1024" height="683" src="https://ravingroo.com/wp-content/uploads/2015/06/file-folder-no-list.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/06/file-folder-no-list.jpg?w=1024&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/06/file-folder-no-list.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/06/file-folder-no-list.jpg?resize=535%2C357&amp;ssl=1 535w" sizes="(max-width: 1024px) 100vw, 1024px" /></p><p>Let&#8217;s say you have an application that has a flat file repository for files attached to records. In other words, the application uses a simple Windows share for its file repository. And all users of this application need the ability to read, write, and delete files in this directory, but given the sensitive nature of...<br /><a class="moretag" href="https://ravingroo.com/1150/windows-file-share-permissions-allow-read-write-delete-deny-list/">Read On...</a></p>
The post <a href="https://ravingroo.com/1150/windows-file-share-permissions-allow-read-write-delete-deny-list/">Windows File Share Permissions – Allow: Read, Write, Delete – Deny: List</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/1150/windows-file-share-permissions-allow-read-write-delete-deny-list/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1150</post-id>	</item>
		<item>
		<title>PowerShell: Compare Membership Of Two Active Directory Groups</title>
		<link>https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/</link>
					<comments>https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/#respond</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Sat, 06 Sep 2014 00:37:06 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[duplicate membership]]></category>
		<category><![CDATA[group]]></category>
		<category><![CDATA[groups]]></category>
		<category><![CDATA[membership]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[SamAccountName]]></category>
		<category><![CDATA[user]]></category>
		<category><![CDATA[username]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=1030</guid>

					<description><![CDATA[<p><img width="1024" height="768" src="https://ravingroo.com/wp-content/uploads/2014/09/powershell.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2014/09/powershell.jpg?w=1024&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2014/09/powershell.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2014/09/powershell.jpg?resize=535%2C401&amp;ssl=1 535w" sizes="(max-width: 1024px) 100vw, 1024px" /></p><p>At my company we have a web filtering solution (McAfee Web Protection) where we use Active Directory groups assigned to specific web filtering policies. Even though these groups are not supposed to have duplicate user accounts, over time, with multiple people administering them, that is exactly what has occurred. I needed a quick way to compare...<br /><a class="moretag" href="https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/">Read On...</a></p>
The post <a href="https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/">PowerShell: Compare Membership Of Two Active Directory Groups</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1030</post-id>	</item>
		<item>
		<title>Active Directory Shadow Groups: How To Automatically Add OU Users To Security Groups</title>
		<link>https://ravingroo.com/458/active-directory-shadow-group-automatically-add-ou-users-membership/</link>
					<comments>https://ravingroo.com/458/active-directory-shadow-group-automatically-add-ou-users-membership/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Mon, 20 May 2013 21:59:31 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[eDirectory]]></category>
		<category><![CDATA[group]]></category>
		<category><![CDATA[NDS]]></category>
		<category><![CDATA[Novell]]></category>
		<category><![CDATA[organizational unit]]></category>
		<category><![CDATA[OU]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[security group]]></category>
		<category><![CDATA[shadow group]]></category>
		<category><![CDATA[task scheduler]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=458</guid>

					<description><![CDATA[<p><img width="800" height="533" src="https://ravingroo.com/wp-content/uploads/2013/05/members-only.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/members-only.jpg?w=800&amp;ssl=1 800w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/members-only.jpg?resize=300%2C199&amp;ssl=1 300w" sizes="(max-width: 800px) 100vw, 800px" /></p><p>Remember Novell? Remember NDS or eDirectory as it later became known? NDS might be mostly dead, in favor of AD (Active Directory), but NDS did have many advantages over AD, and one of them was the ability to assign rights (permissions) via OU membership. Want to give users in a specific OU access to a...<br /><a class="moretag" href="https://ravingroo.com/458/active-directory-shadow-group-automatically-add-ou-users-membership/">Read On...</a></p>
The post <a href="https://ravingroo.com/458/active-directory-shadow-group-automatically-add-ou-users-membership/">Active Directory Shadow Groups: How To Automatically Add OU Users To Security Groups</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/458/active-directory-shadow-group-automatically-add-ou-users-membership/feed/</wfw:commentRss>
			<slash:comments>42</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">458</post-id>	</item>
		<item>
		<title>Active Directory: Account Lockout Policy &#8211; Think Twice Before Applying</title>
		<link>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/</link>
					<comments>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Thu, 16 May 2013 21:20:14 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[account lockout policy]]></category>
		<category><![CDATA[Citrix Netscaler]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[lockout]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[logon]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[service account]]></category>
		<category><![CDATA[threshold]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=295</guid>

					<description><![CDATA[<p><img width="1024" height="683" src="https://ravingroo.com/wp-content/uploads/2013/05/locks.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/locks.jpg?w=1024&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/locks.jpg?resize=300%2C200&amp;ssl=1 300w" sizes="(max-width: 1024px) 100vw, 1024px" /></p><p>The Account Lockout Policy in Active Directory is not what it seems. Oh sure, at first glance it appears simple enough. Set a threshold, set a counter, and when that threshold is tripped in the allotted time, account locked out. What could be simpler right? Well, as with most things in IT, what should be simple isn&#8217;t....<br /><a class="moretag" href="https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/">Read On...</a></p>
The post <a href="https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/">Active Directory: Account Lockout Policy – Think Twice Before Applying</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/295/active-directory-account-lockout-policy-threshold-counter-strong-password/feed/</wfw:commentRss>
			<slash:comments>19</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">295</post-id>	</item>
		<item>
		<title>Active Directory: Workstation Logon Restrictions (Log On To)</title>
		<link>https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/</link>
					<comments>https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Tue, 14 May 2013 23:08:43 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[log on to]]></category>
		<category><![CDATA[restriction]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[user]]></category>
		<category><![CDATA[vendor]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=267</guid>

					<description><![CDATA[<p>I think the &#8220;Log On To&#8221; setting within the Account tab of an Active Directory user could easily be overlooked. As simple as this setting is, it&#8217;s very easy to forget about it in favor of something more elaborate when attempting to restrict user access to specific computers. Let&#8217;s say you want to allow a...<br /><a class="moretag" href="https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/">Read On...</a></p>
The post <a href="https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/">Active Directory: Workstation Logon Restrictions (Log On To)</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/feed/</wfw:commentRss>
			<slash:comments>28</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">267</post-id>	</item>
	</channel>
</rss>
