Skip to content

MAHARJAN-TECH

"Innovate, Implement, Inspire."

Menu
    • Active Directory (AD)
      • ACTIVE DIRECTORY CERTIFICATE SERVICES
      • ACTIVE DIRECTORY DOMAIN SERVICES
      • AZURE-ADCONNECT
      • DOMAIN NAME SERVER (DNS)
    • ASR
    • Azure (AZ)
    • Blog
    • Exchange-Server-2019-CU13
    • Exchange-Server-2019-CU15
    • Exchange-Server-SE
    • FILE-SERVER
    • GPOs
    • GROUP POLICY MANAGEMENT
    • Group Policy Series
    • Home
    • Microsoft Exchange
    • Microsoft365 (M365)
      • MS-Intune
    • MS-Exchange
    • My Blogs
    • Office-Online-Server (OOS)
    • SHAREPOINT-ONLINE (SP-Online)
    • Why Read My Blog?
    • WINDOWS-SERVER
    • WSUS-SERVER

binod.maharjan

EXCHANGE-ONPREMISE / MICROSOFT-EXCHANGE

Exchange Server 2019 CU13: Deployment and Post-Installation Validation

In Part 1, we established our foundation with OS hardening and Active Directory preparation. With our Schema confirmed at 17003, we are ready to execute the installation of Exchange Server …

EXCHANGE-ONPREMISE / MICROSOFT-EXCHANGE

Exchange Server Prep Guide (Part 1): Hardening the OS and Preparing Active Directory

Building a resilient Exchange environment starts long before you double-click Setup.exe. To ensure a smooth deployment—especially with Exchange Server CU13 ISO—the foundation must be rock-solid. In this first part, we’ll …

ACTIVE-DIRECTORY / AD-SECURITY

AD Security Series Part 1: How to Audit and Fix Kerberoasting & AS-REP Roasting

Introduction Start by explaining that attackers don’t always need to “break in”—sometimes they just “ask.” “In Active Directory, certain accounts are configured in a way that allows any authenticated user …

GPO

BitLocker Series Part 5: Automating Recovery Password Cleanup via PowerShell

Introduction Over time, a single computer object in Active Directory can accumulate multiple BitLocker recovery GUIDs. This happens during OS reinstalls, manual decryption/re-encryption cycles, or when “Backup to AD” policies …

GPO

BitLocker Series Part 4: Moving from Auto-Unlock to Manual Security

Introduction In an era where physical device theft and sophisticated “cold boot” attacks are rising, relying on transparent encryption is no longer enough for high-stakes environments. While BitLocker’s “Auto-Unlock” features …

GPO

BitLocker GPO Series | Part 3: Testing Persistence, Portability, and New Hardware

Introduction In Part 2, we secured our internal fixed drives. But a common question from IT managers is: “What happens to the policy when the hardware changes?” In this post, …

GPO

BitLocker GPO Series | Part 2: Automating Protection for Fixed Data Drives

Introduction In the first part of this series, we secured the Operating System drive. However, in many enterprise environments, workstations are equipped with secondary internal drives for storage. Leaving these …

GPO

BitLocker GPO Series | Part 1: Establishing the Security Foundation

Introduction In an era where data breaches can define the reputation of an organization, securing “data at rest” is no longer optional—it is a baseline requirement. For many IT administrators, …

ACTIVE-DIRECTORY

Forensics Part 4: The Digital Post-Mortem — Healing the City

We have found the Artifacts, analyzed the Ghosts, and reconstructed the Timeline. The intruder has been identified and their path is clear. But a Mindful Architect knows that the job …

ACTIVE-DIRECTORY

Forensics Part 3: Timelining the Intrusion — Connecting the Shadows

In the first two parts of our Forensics series, we collected Artifacts (Logs) and analyzed Ghosts (RAM). But right now, we just have a pile of evidence. To catch an …

Posts navigation

Older posts
Copyright © 2026 MAHARJAN-TECH – OnePress theme by FameThemes