Wednesday, 31 August 2016

Microsoft: Tombstone in Active Directory


Tombstone lifetime value states that how many days deleted objects will remains in deleted object containers. The basic purpose of tombstone is to keep all domain controllers in sync.

When you delete an AD object, a number of things happen behind the scenes. Most important, deleting an object doesn’t directly correlate to a record being removed from the AD database. To maintain consistency in AD’s replication model, objects first transition through a state known as being tombstoned. Rather than implementing a distributed mechanism to replicate physical deletions from the database, AD replicates a change to an attribute that indicates the object has been deleted.

When you delete an object from AD, the isDeleted attribute is set to True, which means nearly all the object’s attributes are removed. The object is moved to the Deleted Objects container, and its lastKnownParent attribute is stamped with the distinguished name (DN) of the parent object before the object is deleted. After an object has been marked as deleted, it won’t be visible to any tools that query AD, unless you add a special LDAP control to indicate that you want AD to return deleted objects in the search results. Various free LDAP query tools (such as AdFind) will include this LDAP control for you and allow you to easily search for deleted objects.

At this point, the object will remain as a tombstone for a period of time. The default tombstone lifetime for forests is based on the OS of the first DC in the forest. Table 1 shows the default tombstone lifetimes. Upgrading AD doesn’t change the tombstone lifetime for the forest.

Periodically, a background process called garbage collection runs on each DC. The garbage collection process (aka garbage collector) scans the database for tombstones that are older than the forest’s tombstone lifetime and purges them from the AD database.

Up until the point when a tombstone is purged by the garbage collector, you can recover the object using a process known as tombstone reanimation. When you reanimate a tombstone, you only get back a handful of attributes that are kept during the tombstoning process. For example, the attributes saved for a user object include the user’s SID, SID history, and username (sAMAccountName). Notice that this list doesn’t include attributes such as the user’s password, group membership, or demographic information (e.g., name, department). You can control the list of attributes that are preserved when an object is tombstoned by modifying the searchFlags attribute of an individual attribute’s definition in the schema. You can add as many attributes as you like. However, you can’t add linked attributes, such as group membership or the mailbox database containing a user’s mailbox. For information about how to modify the searchFlags attribute, see the MSDN web page “Search-Flags Attribute”.

In AD forests operating at the Server 2008 R2 forest functional level (FFL), you can enable a new feature known as the Active Directory Recycle Bin. The Active Directory Recycle Bin adds an intermediate state between when an object is deleted and when it is tombstoned. When an object is in this new deleted state, it’s hidden from search results but all its attributes (including linked attributes such as group membership) are preserved.

An object in the deleted object phase can be recovered to the exact state it was in at the time of deletion using the same process that’s used to reanimate a tombstone. By default, an object stays in the deleted object phase for the same amount of time as the forest’s tombstone lifetime, as outlined in Table 1. You can change this time period by modifying the forest’s msDS-deletedObjectLifetime attribute.

After the deleted object lifetime expires, the garbage collector moves the object into the recycled object phase. A recycled object is the functional equivalent of a tombstone, with one important difference: You can’t reanimate a recycled object or restore it from a backup.

Friday, 17 June 2016

Google: Google Docs Allows You to Limit Access with An Expiration Date


In business, many people collaborate with clients, contractors and other small companies for a short length of time. You might want to give them access to some of your documents -- a list of your team's contact details, for instance -- and then revoke access once the job has been wrapped up. Well, Google is now starting to offer that feature to Google Apps customers that use Drive, Docs, Sheets and Slides. So when you share a file with someone, you'll also get the option to set an expiry date. Handy.

There is one caveat, however -- the person that's limited by the expiry date can only have view access. So if you want to given them permission to actually edit a Google Doc, you'll still need to go in and lock them out the old fashioned way at the end of the project. Still, for enterprise customers this should be a useful tool, and one more reason to consider Google's productivity suite over Microsoft Office. We just hope this eventually rolls out to all Google users, and not just those with Google Apps accounts.

Thursday, 26 May 2016

VMware: Missing Hardware Status Tab in VMware vCenter


If you are missing the Hardware Status Tab in your VMware vCenter, you may solve it by following the steps below:
1. Go to vCenter – Plug-ins – Manage Plug-ins
2. Right-click on the plug-ins
3. Select “enable”

Tuesday, 24 May 2016

Apple: Link Speed - Network Utility Mac OSX


You can use the Network Utility by using Cmd+Space to pull up the Spotlight search box and typing it in, or you can navigate through your Applications -> Utilities folder to find it.

Once you’re there, you can see the current connection speed by looking at the Link Speed, which will show the actual data rate that you’re using. This rate will change as you move around your house, so if you’re far away from the router, the rate will change, and if you’re closer, it will get higher.

Wednesday, 18 May 2016

Apple: Repair Disk Permission in El Capitan

For El Capitan, you need to use the following commands to repair the disk permission:
sudo /usr/libexec/repair_packages --verify --standard-pkgs /

Wednesday, 11 May 2016

APC: Default Authentication Phrase for PowerChute Network Shutdown (PCNS)


The administrator authentication phrase used by PowerChute Network Shutdown (PCNS) should be the same as that used in the NMC. The default used by the NMC is: admin user phrase

IT Technology: WhatsApp Desktop Client


WhatsApp has launched a desktop companion for its popular mobile messaging app. While it's little more than a wrapper for its web version, it does provide action center notifications on Windows 10, as well as native integration for sending files and utilizing the camera.

To access the service, you'll need to authenticate with a mobile phone and scan a QR code as you would with the web version.