project database

Nest an Active Directory security group? Do it thoughtfully.

I just read a great article by Rick Vanover called,  Windows security groups: To nest or not?  He asks the question because a nested security can be a bear to troubleshoot if you start getting quirky permissions issues. In the article Rick states, “I would love to say that nesting group membership is prohibited, but there are…

project database

An alternative to Query Based Distribution Lists (QBDL)

Every once in a while I find myself describing a dynamic Active Directory group as “query based.”  This always begs the question, how does this dynamic group differ from Microsoft Exchange’s Query Based Distribution List (QBDL)? It is actually a pretty simple answer, when GroupID Automate creates a dynamic group, it actually creates the group…

project database

Active Directory Provisioning Tool

I follow Twitter pretty closely.  I use it to keep up with what the intelligentsia are saying about Active Directory, what new products are coming out, and generally the scuttlebutt on the industry.  I follow analysts, customers, writers and most importantly directory services MVPs. So I was a little surprised to see this comment recently:…

project database

Group management with Microsoft’s BPOS

When a Microsoft customer buys group management for Microsoft’s Business Productivity Online Suite (BPOS), they are using Imanami’s self service web portal.  But they are using an older version of GroupID Self Service called WebDir that lacks some of the advanced group management features that we have innovated. There are good reasons for this, Microsoft…

project database

The case for a bad word filter in Active Directory

A search on the term “Active Directory” in Twitter brought up this item this morning: I have written about an Active Directory bad word filter before and just find it funny that within a week there is the perfect example of why you need a filter for Active Directory groups.  Of course, this twitterer is…

project database

VPN Access via Active Directory Security Group

A Virtual Private Network or VPN, is a technology that helps you establish an encrypted environment on your network so that when you access the World Wide Web, your system is safe and secure from prying eyes. In addition to this, VPN also facilitates in hiding your IP address so that you can visit websites…

project database

Self service bulk loader for Active Directory groups

So you have decided to delegate Active Directory management to your end users, resolving that they know who should be in their AD groups better than the help desk ever will.  The thing is, users keep lists: department lists, lists of people who help plan office parties, lists of department assistants, et cetera. When giving the…

project database

Expire an Active Directory group to limit exposure

We had our customer advisory committee meeting today where we discuss product priorities with a select group of customers.  This is part of the Agile Methodology where a group of stakeholders help set priorities and define what features should look like. As always, Active Directory group lifecycle was discussed; we are looking at new and…

project database

What do you do about Active Directory groups with no members?

I was recently perusing Technet’s script repository which details all of the scripts related to Active Directory groups.  It was fascinating in that these scripts did a lot of great things but required quite a lot of work if you wanted them for anything other than one-off requests.  And that’s not even getting into the…