Skip to content

MAHARJAN-TECH

"Innovate, Implement, Inspire."

Menu
    • Active Directory (AD)
      • ACTIVE DIRECTORY CERTIFICATE SERVICES
      • ACTIVE DIRECTORY DOMAIN SERVICES
      • AZURE-ADCONNECT
      • DOMAIN NAME SERVER (DNS)
    • ASR
    • Azure (AZ)
    • Blog
    • FILE-SERVER
    • GROUP POLICY MANAGEMENT
    • Group Policy Series
    • Home
    • Microsoft Exchange
    • MICROSOFT EXCHANGE – SINGLE SERVER
    • Microsoft365 (M365)
      • MS-Intune
    • MS-Exchange
    • My Blogs
    • Office-Online-Server (OOS)
    • SHAREPOINT-ONLINE (SP-Online)
    • Why Read My Blog?
    • WINDOWS-SERVER
    • WSUS-SERVER

ACTIVE-DIRECTORY

ACTIVE-DIRECTORY

Hybrid Part 4: Cloud Hardening — The Gatekeeper (Conditional Access)

We have built the Bridge, chosen our Heartbeat, and enabled Flow with Seamless SSO. Our “Satellite Colony” is now fully functional. But there is a new danger: the Cloud is …

ACTIVE-DIRECTORY

Hybrid Part 3: Seamless SSO — The Magic of the Invisible Login

In the previous parts of Level 4, we built the bridge and decided how the cloud checks our “ID cards.” But as a Mindful Architect, we must eventually ask: Why …

ACTIVE-DIRECTORY

Hybrid Part 2: PHS vs. PTA — Choosing the Right Heartbeat

In Part 1, we built the Bridge (Entra Connect) between our physical City Hall and our Satellite Colony in the cloud. But now we face a crucial architectural decision: Who …

ACTIVE-DIRECTORY

Hybrid Part 1: The Bridge to the Cloud — Understanding Entra ID Connect

For three levels, we have perfected our on-premises “City Hall.” But today, the world works differently. Your citizens (users) want to access their files from home, on their phones, and …

ACTIVE-DIRECTORY

Security Part 5: The Red Team Mindset — Using Honeypots and Decoys

We have spent this series hardening the gates, watching the logs, and securing the keys. But in the world of modern cybersecurity, a “Mindful Architect” must accept a difficult truth: …

ACTIVE-DIRECTORY

Security Part 4: The Silent Observer — Mastering Advanced Auditing

We have built the Tiered Fortress, enforced Temporary Power, and closed the Legacy Back Doors. But even in the most secure city, things happen. A gate is opened. A file …

ACTIVE-DIRECTORY

Security Part 3: Closing the Back Doors — Securing Legacy Protocols

In the first two parts of this series, we built a Tiered Fortress and mastered Temporary Power. But even a fortress with high walls is vulnerable if there are old, …

ACTIVE-DIRECTORY

Security Part 2: JIT & JEA — Power That Disappears

In Part 1, we built the walls of our Tiered Fortress. But even inside a fortress, there is a risk. If a “Guard” has keys to the armory 24 hours …

ACTIVE-DIRECTORY

Security Part 1: The Tiered Fortress — Protecting the Crown Jewels

In our previous series, we built the city and learned how to run it. But in a world of digital sieges, a “Mindful Architect” must realize a hard truth: If …

ACTIVE-DIRECTORY

Administration Part 5: The Robot Workforce — Automating the Boring Stuff

We have built the city, secured the gates, and set up our time machine. But as any busy Architect knows, the most valuable resource we have isn’t hardware or software—it’s …

Posts navigation

Older posts
Newer posts
Copyright © 2026 MAHARJAN-TECH – OnePress theme by FameThemes