<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>user | Raving Roo</title>
	<atom:link href="https://ravingroo.com/tag/user/feed/" rel="self" type="application/rss+xml" />
	<link>https://ravingroo.com</link>
	<description>Chew the Fat</description>
	<lastBuildDate>Wed, 23 Dec 2015 21:10:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/ravingroo.com/wp-content/uploads/2019/06/cropped-kangaroo-silhouette2.png?fit=32%2C32&#038;ssl=1</url>
	<title>user | Raving Roo</title>
	<link>https://ravingroo.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">25842277</site>	<item>
		<title>How To Create And Manage Password Settings Objects (PSO)</title>
		<link>https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/</link>
					<comments>https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/#respond</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Wed, 23 Dec 2015 19:45:09 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[ADSI Edit]]></category>
		<category><![CDATA[attribute]]></category>
		<category><![CDATA[attribute editor]]></category>
		<category><![CDATA[Fine-grained password policy]]></category>
		<category><![CDATA[FQDN]]></category>
		<category><![CDATA[GPO]]></category>
		<category><![CDATA[group]]></category>
		<category><![CDATA[group policy]]></category>
		<category><![CDATA[object]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password policy]]></category>
		<category><![CDATA[PSO]]></category>
		<category><![CDATA[user]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=1224</guid>

					<description><![CDATA[<p><img width="2048" height="1151" src="https://ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?w=2048&amp;ssl=1 2048w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=768%2C432&amp;ssl=1 768w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=1024%2C576&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?resize=535%2C301&amp;ssl=1 535w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2015/12/linux-password-file-photo-by-christiaan-colen-via-flickr.jpg?w=1960&amp;ssl=1 1960w" sizes="(max-width: 2048px) 100vw, 2048px" /></p><p>With Windows Server 2008, Microsoft introduced Fine-Grained Password policies which utilizes a new Active Directory object called Password Settings Object (PSO). These objects allow you to more easily create and assign password policies to subsets of users, albeit with a bit of an unpolished implementation method compared to the old method via group policy (GPO). If...<br /><a class="moretag" href="https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/">Read On...</a></p>
The post <a href="https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/">How To Create And Manage Password Settings Objects (PSO)</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/1224/fine-grained-create-manage-password-settings-object-pso-active-directory-adsi-attribute-edit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1224</post-id>	</item>
		<item>
		<title>PowerShell: Compare Membership Of Two Active Directory Groups</title>
		<link>https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/</link>
					<comments>https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/#respond</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Sat, 06 Sep 2014 00:37:06 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[duplicate membership]]></category>
		<category><![CDATA[group]]></category>
		<category><![CDATA[groups]]></category>
		<category><![CDATA[membership]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[SamAccountName]]></category>
		<category><![CDATA[user]]></category>
		<category><![CDATA[username]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=1030</guid>

					<description><![CDATA[<p><img width="1024" height="768" src="https://ravingroo.com/wp-content/uploads/2014/09/powershell.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2014/09/powershell.jpg?w=1024&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2014/09/powershell.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2014/09/powershell.jpg?resize=535%2C401&amp;ssl=1 535w" sizes="(max-width: 1024px) 100vw, 1024px" /></p><p>At my company we have a web filtering solution (McAfee Web Protection) where we use Active Directory groups assigned to specific web filtering policies. Even though these groups are not supposed to have duplicate user accounts, over time, with multiple people administering them, that is exactly what has occurred. I needed a quick way to compare...<br /><a class="moretag" href="https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/">Read On...</a></p>
The post <a href="https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/">PowerShell: Compare Membership Of Two Active Directory Groups</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/1030/powershell-compare-membership-of-two-active-directory-groups/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1030</post-id>	</item>
		<item>
		<title>Active Directory: Workstation Logon Restrictions (Log On To)</title>
		<link>https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/</link>
					<comments>https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Tue, 14 May 2013 23:08:43 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[IT How To]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[log on to]]></category>
		<category><![CDATA[restriction]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[user]]></category>
		<category><![CDATA[vendor]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=267</guid>

					<description><![CDATA[<p>I think the &#8220;Log On To&#8221; setting within the Account tab of an Active Directory user could easily be overlooked. As simple as this setting is, it&#8217;s very easy to forget about it in favor of something more elaborate when attempting to restrict user access to specific computers. Let&#8217;s say you want to allow a...<br /><a class="moretag" href="https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/">Read On...</a></p>
The post <a href="https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/">Active Directory: Workstation Logon Restrictions (Log On To)</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/267/active-directory-user-workstation-logon-restriction/feed/</wfw:commentRss>
			<slash:comments>28</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">267</post-id>	</item>
	</channel>
</rss>
