Scott's Weblog The weblog of an IT pro specializing in virtualization, networking, open source, and cloud computing

Complex Queries Against Active Directory

For example, consider a situation where you may need to compare two different attributes in Active Directory and list those accounts where the two attributes aren’t the same. One excellent example is the situation where an organization has standardized on UPN (User Principal Name; looks like an RFC 822-compliant e-mail address) logons, and each user’s UPN is supposed to match that user’s e-mail address. How do you go about finding those accounts where the UPN and primary e-mail address don’t match?

(Read more...)

Best Practices Analyzers

The Exchange Best Practices Analyzer (ExBPA) has been around for a while now, and is a very useful tool in making sure that your Exchange implementation is following recommended best practices from Microsoft for optimal performance, reliability, and scalability. The ExBPA was recently updated to include the ability to check the overall Exchange topology for readiness to upgrade to Exchange Server 2007. The Exchange team blog has full details on the new “Readiness Check” in this posting.

(Read more...)

Improving Windows Security

The article, titled “Five Ways to Get Vista’s Security Now,” discusses five options for getting the equivalent of Vista’s User Account Control (UAC) functionality on today’s Windows. UAC is one of the most widely touted new security features in Windows Vista because it eliminates the security hole that is created by needing to log in with an administrative-level user account (many applications won’t run properly without administrative permissions).

(Read more...)

Active Directory and VAS

The problem first presented itself as latency in responses from the domain controllers (DCs) to the Exchange servers and Outlook clients, resulting in slow responses in the Outlook client, delays in receiving new e-mail messages, etc. Upon closer inspection, we determined that the problem was excessive CPU utilization on the DCs. As we examined the DCs more closely, we then determined that traffic from the customer’s UNIX servers were driving up the CPU usage on the DCs.

(Read more...)

Mass Changes in Active Directory, Take 2

In the original article on how to make mass changes to Active Directory, we discussed the use of csvde to produce the original output from Active Directory, Log Parser to massage the information into LDIF format, and ldifde to import the changes back into Active Directory. Based on some additional testing of this procedure, I made some changes to that article, and I wanted to include additional information here.

(Read more...)

Josh Bates

It’s a really good CD, actually, and I’m particularly enjoying a couple of the tracks. He’s got a great voice, and the music and lyrics are good. So far, the title track (“Perfect Day”) is a favorite of mine, and I’m also enjoying “Alive” and “You Say Come.” “King of Glory” is another great song, and I believe that it’s a hit single on the charts right now.

(Read more...)

Listing Groups in Active Directory

There’s nothing really unusual or new about the commands we’ll use to perform this task, other than the little tidbit about how to search for specific types of groups; I disclosed that information while discussing how to enumerate membership in universal groups.

(Read more...)

Monitoring Event Logs with Log Parser

If you haven’t yet downloaded Log Parser 2.2 (the current version), you can get it from Microsoft’s download site.

(Read more...)

PowerPoint Zero-Day Exploit

The zero-day exploit takes advantage of a previous unknown vulnerability in PowerPoint to install a Trojan Horse application. The vulnerability affects PowerPoint 2000, 2002, and 2003 running on various flavors of Microsoft Windows; it is unclear at this time whether Macintosh versions of Office are affected. Based on what is known of exploit, it seems unlikely that Macs could be affected by the exploit, but that is not to say that the vulnerability doesn’t exist in the Mac versions of Office. (Keep in mind that a vulnerability isn’t the same as an exploit.)

(Read more...)

GPMC Scripts

These scripts are mostly VBScript, with a couple JScript, and are (by default) found in the Program Files\GPMC\Scripts folder. They are designed to be executed with the cscript.exe command-line script interpreter, and they all offer help via the /? parameter on the command line.

(Read more...)