ADAllTheTime Profile Banner
Active Directory Things Profile
Active Directory Things

@ADAllTheTime

Followers
3K
Following
191
Media
64
Statuses
147

Microsoft Certified Master (MCM): Active Directory. Previously AD field engineer at Microsoft. Notes from the field & the lab (@duff22b)

Joined January 2025
Don't wanna be here? Send us removal request.
@ADAllTheTime
Active Directory Things
5 months
"Kerb3961", named after RFC3961, is a refactor of the Kerberos cryptography engine in its own library in Server 2025 and Win 11 24H2. Great blog post by Will Aftring that will get you up to speed quickly:
techcommunity.microsoft.com
Howdy, everyone! I wanted to write this blog post to discuss the new Kerb3961 library introduced in Windows Server 2025 / Windows 11 24H2. It is (hopefully)...
0
24
84
@SpecterOps
SpecterOps
5 months
BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest. Check out @JimSycurity's latest blog post to understand how you can mitigate risk.
Tweet card summary image
specterops.io
Understanding the impact of the BadSuccessor AD attack primitive and mitigating the abuse via targeted Deny ACEs on Organizational Units.
2
107
238
@ADAllTheTime
Active Directory Things
5 months
Useful post for anyone tasked with reviewing the windows audit policy: "A Data-Driven Approach to Windows Advanced Audit Policy – What to Enable and Why" by Nasreddine Bencherchali https://t.co/JUCNaBJa6P
splunk.com
Maximize visibility without overwhelming your SIEM with this data-driven guide to Windows Advanced Audit Policy.
2
21
84
@ADAllTheTime
Active Directory Things
5 months
Microsoft have issued a 'consider disabling this service' recommendation which affects Active Directory: "We're advising all enterprise customers who have deployed Windows Server OS (Windows Server 2016, Windows Server 2019, Windows Server 2022, and all intermediate releases
3
61
236
@ADAllTheTime
Active Directory Things
6 months
Here's a quirky (but sensible) one to be aware of for troubleshooting in-house apps that use AD: With AD on server 2025 the default is to only allow LDAP to add, search, and modify operations that involve confidential attributes WHEN THE CONNECTION IS ENCRYPTED. More changes
0
16
61
@ADAllTheTime
Active Directory Things
6 months
If you need to simulate the windows domain controller locator API (DSGETDCNAME) on a client to see which DC they would be talking to, or which site they believe they are in, use nltest: nltest /dsgetdc:yourdomain.local
1
21
129
@ADAllTheTime
Active Directory Things
6 months
We know that "ipconfig /displaydns" can be used to inspect the DNS cache on a windows client It's especially useful for AD troubleshooting though. Example: we can understand why a client might still be talking to a DC that was moved to a new site. You can see that this guy
3
35
274
@ADAllTheTime
Active Directory Things
7 months
If you need to pinpoint which DC made the change to an AD object/attribute you can use: repadmin /showobjmeta dcname objectDN It's a handy place to start; then go inspect the event logs for that DC to get more detail on whatever you're trying to find out.
0
45
215
@ADAllTheTime
Active Directory Things
7 months
An interesting approach a customer showed me was to take that further, manually, on all servers. Keep a 1GB file on the disk for a similar unlikely emergency; remove it if you miss (ignore) whatever alerting you have going off and then fix the problem whichever way you see fit.
3
0
9
@ADAllTheTime
Active Directory Things
7 months
AD uses "res" (reserved space) files: edbres00001.jrs & edbres00002.jrs to deliberately take space on the disk in case it unexpectantly fills up. AD can delete the res files in an emergency, free the little bit of space and safely commit transactions in flight to disk.
1
11
104
@MPECSInc
Philip Elder
7 months
OPINION + METHODS: ACTIVE DIRECTORY MIGRATION+ CHECKLISTS! ON PAPER! Prepping for a cut-over is never complete ... at least it seems that way. We have extensive migration check lists that we've built since my BackOffice Small Business Server (NT 4/4.5) days. Yeah, things have
1
14
75
@ADAllTheTime
Active Directory Things
7 months
The "Branch Office Deployment Guide" was gold for learning active directory. Step by Step docs to build a complex lab and replication topology including things that you might not see in many AD environments. Its gone now. But there is a backup here: https://t.co/mU3uhCoxhl
4
43
209
@Dinosn
Nicolas Krassas
7 months
SharpADWS: Active Directory reconnaissance and exploitation for Red Teams
meterpreter.org
SharpADWS is an Active Directory reconnaissance and exploitation tool for Red Teams that collects and modifies Active Directory data
1
38
130
@MGrafnetter
📔 Michael Grafnetter
7 months
Here is a new custom administrative template (ADMX) for editing and auditing Microsoft Defender Attack Surface Reduction (ASR) policies, without being exposed to the rule GUIDs. https://t.co/3FQIYvjh4s
3
16
97
@MGrafnetter
📔 Michael Grafnetter
7 months
Together with @pavelfor, we have created the ultimate guide and tooling for configuring host-based firewalls on #ActiveDirectory domain controllers in enterprise environments. Blocks most remote command execution and authentication coercion techniques. https://t.co/85V30HTlMB
7
71
234
@theluemmel
LuemmelSec
7 months
Domain Password Spray from a NON Domain joined box (doesn't matter if Win or Lin) what do you use?
14
12
111