#active-directory
24 articles
Tutorials12

How to Bulk Import Active Directory Users from CSV Using PowerShell
Learn to efficiently import multiple users into Active Directory from a CSV file using PowerShell scripts with proper validation and error handling.

How to Monitor Active Directory Health with PowerShell Scripts
Create automated health monitoring for Active Directory Domain Controllers using PowerShell scripts, scheduled reports, and email notifications for proactive AD infrastructure management.

How to Restore a Deleted Microsoft 365 Hybrid User Account
Learn to restore a deleted user account in a hybrid environment by recovering from Active Directory Recycle Bin, syncing with Microsoft Entra Connect, and verifying access restoration.

How to Export BitLocker Recovery Keys from Active Directory Using PowerShell
Create and run a PowerShell script to extract BitLocker recovery keys from Active Directory and export them to CSV with computer names, recovery passwords, and timestamps.

Enable Active Directory Recycle Bin on Windows Server 2022
Enable and configure Active Directory Recycle Bin to recover deleted AD objects without backups. Learn both PowerShell and GUI methods with verification steps.

How to Install and Configure Microsoft Entra Connect for Directory Sync
Install and configure Microsoft Entra Connect to synchronize your on-premises Active Directory with Microsoft Entra ID (Azure AD), enabling hybrid identity management.

How to Configure Windows 10/11 Using Group Policy Objects (GPO)
Learn to create and configure Group Policy Objects to optimize Windows 10/11 environments, disable privacy prompts, widgets, web search, OneDrive integration, and customize taskbar settings in enterprise domains.

Create Desktop Shortcuts for Domain Users Using Group Policy (GPO)
Deploy desktop shortcuts automatically to all domain-joined Windows computers using Group Policy Preferences. Configure shortcuts for applications, URLs, and network resources with targeting options.

How to Join Windows Server Core to Active Directory Using SConfig
Learn to join Windows Server Core 2025 to an Active Directory domain using the SConfig utility. Complete guide with network configuration, domain join process, and verification steps.

How to Customize Windows Login and Lock Screen Using Group Policy (GPO)
Learn to customize Windows login and lock screen backgrounds using Group Policy Objects in Active Directory environments. Configure corporate branding, legal notices, and prevent user modifications across Windows 11 Pro/Enterprise systems.

How to Configure LDAPS Protocol in Active Directory 2026
Configure LDAPS (LDAP over SSL) in Active Directory to secure domain controller connections using SSL certificates on port 636. Complete setup with certificate enrollment and verification.

How to Install Active Directory Domain Services on Windows Server 2025
Install the AD DS role on Windows Server 2025 and create a new Active Directory domain with enhanced security features and Win2025 functional levels.
Windows Events12
Windows Event ID 4936 – Microsoft-Windows-Security-Auditing: User Account Management Policy Change
Event ID 4936 logs changes to user account management policies in Active Directory. This security audit event fires when administrators modify password policies, account lockout settings, or Kerberos authentication policies.
Windows Event ID 4928 – Microsoft-Windows-Security-Auditing: Active Directory Replica Source Naming Context Established
Event ID 4928 indicates that an Active Directory replica source naming context has been successfully established between domain controllers during replication operations.
Windows Event ID 4908 – Security: Trusted Domain Information Changed
Event ID 4908 indicates that trusted domain information has been modified on a domain controller, typically during domain trust establishment, modification, or removal operations.
Windows Event ID 4768 – Microsoft-Windows-Security-Auditing: Kerberos Authentication Ticket (TGT) Requested
Event ID 4768 logs when a user or service requests a Kerberos Ticket Granting Ticket (TGT) from a domain controller during authentication.
Windows Event ID 4706 – Microsoft-Windows-Security-Auditing: Directory Service Object Created
Event ID 4706 logs when a new object is created in Active Directory Domain Services. This security audit event tracks organizational unit, user, group, and computer account creation for compliance monitoring.
Windows Event ID 5137 – Microsoft-Windows-Security-Auditing: Directory Service Object Created
Event ID 5137 logs when a new object is created in Active Directory, providing detailed audit information about the creation event, including the object DN, class, and security principal responsible.
Windows Event ID 5136 – Microsoft-Windows-Security-Auditing: Directory Service Object Modified
Event ID 5136 logs when Active Directory objects are modified, tracking changes to user accounts, groups, organizational units, and other directory objects for security auditing purposes.
Windows Event ID 4761 – Microsoft-Windows-Security-Auditing: Computer Account Created
Event ID 4761 logs when a computer account is created in Active Directory. This security audit event tracks domain computer additions for compliance and security monitoring purposes.
Windows Event ID 4757 – Microsoft-Windows-Security-Auditing: Universal Security Group Member Removed
Event ID 4757 fires when a member is removed from a universal security group in Active Directory. This audit event tracks group membership changes for security compliance and access control monitoring.
Windows Event ID 4756 – Microsoft-Windows-Security-Auditing: Universal Security Group Member Added
Event ID 4756 fires when a member is added to a universal security group in Active Directory. This security audit event tracks group membership changes for compliance and security monitoring.
Windows Event ID 4754 – Microsoft-Windows-Security-Auditing: Security-Enabled Universal Group Member Added
Event ID 4754 fires when a member is added to a security-enabled universal group in Active Directory. This audit event tracks group membership changes for compliance and security monitoring.
Windows Event ID 4753 – Microsoft-Windows-Security-Auditing: Security-Enabled Global Group Member Removed
Event ID 4753 logs when a member is removed from a security-enabled global group in Active Directory. This security audit event tracks group membership changes for compliance and security monitoring.