Member since
04-25-2017
19
Posts
4
Kudos Received
3
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
3451 | 07-04-2019 04:16 PM | |
1574 | 06-08-2018 12:13 PM | |
6089 | 05-22-2017 10:24 PM |
02-04-2024
08:05 PM
1 Kudo
Hi @Meepoljd Please let me know still you need any help on this issue. If any of the above solutions is helped then mark Accept as Solution.
... View more
01-11-2022
08:11 AM
Many times, Support need to have a look at the Microsoft AD tree for AD internal configuration (e.g. CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration, <domain>). The problem with this part of the AD tree is - it is not visible by default in the AD directory structure.
This article will help the reader to explore the hidden AD tree. Any change in AD should be carried out by the customer’s AD team or admin.
Instructions
Here are the steps:
Log on to the AD server
Run the ADSIEdit.exe program from Start > Run menu.
Select the top-most entry of the left side, and then, select Action > Connect to... from the menu.
In the next dialog box, select Select a well known Naming Context radio button, and select Configuration from the drop-down menu.
Click OK and ADSI Edit will now show CN=Configuration and its sub-tree.
We can now traverse to CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration, <domain> part easily as seen above.
Example: For Microsoft AD vulnerability (CVE-2021-42282), if the user wants to check the value of dSHeuristics attribute under CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration, <domain>, they can follow the steps above, and then, right-click on CN=Directory Service and select Properties > Attribute Editor and find the value of dSHeuristics attribute.
... View more
Labels:
07-08-2019
01:29 AM
Hi Tomas, I applied these and run compaction manually. The size of /atsv2 is smaller. Many thanks!
... View more