Posts

The password does not meet the password policy requirements.Exception from HRESULT: 0x800708C5

Error while changing the AD user password (Change required in GPO policy)

You will get this error while changing the password of Active Directory user directly by using native AD tool or from Cionsystems Enterprise SelfService or ADMPRO Applications.

Resolution : In Domain control “Default Domain Policy “ Set the “Minimum password age” to 0

Follow the below steps for details (Image attach for reference)

In Windows server 2008R2 Start -> Run -> gpmc.msc

Go to Domains -> domainName(cionsystems.com) -> Select Default Domain Policy , right click and edit

Select Computer Configuration -> Policies -> Windows Settings ->Security settings -> Account Policies -> Passowrd Policy -> Set “Minimum password age” to 0

Open Command prompt as administrator gpupdate/force

CionSystem Selfservice Password reset

CionSystem Selfservice Password reset

Active Directory Manager Pro version 5.0

Active Directory Manager Pro 5.0 brings significant enhancements to an already impressive array of capabilities. The ADM PowerShell Console allows users to create, run, save, and modify scripts. The PowerShell scripting workspace lets users create or leverage existing office365, AD, Local exchange and Exchange online.
Many new compliance and governance centric features are now part of Active Directory Manager Pro 5.0, including attestation for user and groups, date range bounded reports, de-provisioning, and more!
Active Directory Manager Pro 5.0 supports all LDAP capable directory services, such as OpenLDAP, Radiant Logic, ViewDS, Novel, IBM Security Directory Server, and any other LDAP compliant service or server. Active Directory Manager Pro 5.0 includes a separate LDAP console for persisting connections and search filters, as well as performing object creation, modification, and deletion. This includes operations on groups and their memberships.
The Search & Manage, options now exist to search accounts based on date ranges. Other search enhancements include wildcard searches, searching deleted objects in the archive and searching for data in reports.
User management and reporting now include last Login and primary group. Further, SID history is now be removed, supporting security hardening and migration activities.
Active Directory Manager Pro 5.0 now supports provisioning and de-provisioning. There is also a csv based de-provisioning capability. Additional Enhancements include enhanced detail in the displays and reports, searchable reports, enhanced schema management functionality, the ability to scope access based on OU, customizable dashboards, and OU based workflows.

Active Directory Manager Pro 5.0’s significantly expanded Exchange 2010 & 2013 management’s new capabilities include:

  • Connect mailbox
  • New MailboxExportRequest
  • Resume MailboxExportRequest
  • Remove Mailbox Export Request
  • List MailboxExportRequest
  • Resume Move Request
  • Remove Move Request
  • List Move Request
  • Get mailbox permissions
  • Manage mailbox permissions
  • Get Active Directory permissions
  • Enable mail contact
  • Manage mail contact email addresses
  • Disable mail contact
  • Remove mail contact
  • List mail contacts
  • List contacts
  • Edit distribution group
  • Disable distribution group
  • Remove distribution group
  • Remove distribution group member
  • Clear Mailbox Database
  • List mailbox databases
Management of workstations and member servers:
  • Create directory (file system)
  • Get file/directory information
  • Copy directory
  • Rename file or directory
  • Delete file(s)
  • Delete directory
  • Create share
  • Edit share
  • Delete share
  • List files and/or directories
  • Execute service command
  • Configure service
  • List printer documents
  • Execute print job command
User management:
  • Remove SID history
  • Get primary group
Generic LDAP workspace:
  • Option to delete directory object on search result of LDAP query
  • Option to save and execute LDAP queries.
  • Allow people to add their own “filters” for generating reports
  • Modify, create, delete, enable, disable and other functions
Powershell workspace:
  • Option to save and execute scripts
  • Share scripts with others
  • Sample scripts
Reports:
  • Report for any LDAP filter
  • Users Not Logged On report
  • OU based search and reports based on date range
  • User last login based on date range
  • Users that were recently added to a specific group
  • Users that were recently removed from a group
  • Recently modified groups
  • All accounts with admin privileges
  • Permissions for specific printers
  • Permissions for all printers
  • OU search based on delegated user
  • Recently created groups
  • All Managers report
  • Smart card enabled users report
  • Users with change Password at next Logon report
  • Detailed Group Members Reports
  • Users Only members of Domain Users Group report
  • Recently created computers report
  • Users without mailbox Report
  • Default Receiving message size report
  • Default storage Limit report
  • OMA Disabled report
  • POP3 Enabled report
  • IMAP4 Enabled report
  • Active Sync Enabled report
  • Active Sync Disabled report
  • Open Group Join Restriction distribution Groups report
  • Closed Group Join Restriction distribution Groups report
  • Approval Required Members Join Restriction distribution Groups report
  • Users with terminal service Access report
  • Permission for folders report
  • Server permissions report
  • Subnet permissions report
  • Servers accessible by accounts report
  • Subnets accessible by accounts report
  • Recently created contacts report
  • Recently deleted contacts report
  • Recently modified contacts report
  • Generating file share permission report using PowerShell
  • Permissions(trustee) of an object
  • Active Directory Object ownership report
  • Send-As and Allowed to Authenticate report
  • Nested Groups report
  • In Computer Reports, IE, Java, Installed Patches and Details report
  • Logon report
  • Report for Store password Using Reversible Encryption
  • Several new reports in Security report section. For example, Full Control Permission Objects, Non-inheritable Objects, List all Permissions of Group, Access Control list of forest, Non-inheritable folder and files.
  • All user Details (brings all information for a user)

CionSystems Releases New Version of its Active Directory Manager Pro

We released the newest version of its application, Active Directory Manager Pro, which works with Microsoft Windows Server® 2008 R2 to offer customers enhanced security, as well as innovative user interface features and reliability improvements. The Active Directory Manager Pro is an affordable and comprehensive web-based application that greatly improves and automates User Provisioning, Deprovisioning and AD management. Managers can view, approve changes, and manage the full user lifecycle, along with automating tasks and generating reports on the Active Directory environment without using any scripts. Making our application compatible with Microsoft Windows Server 2008 R2 helps us offer our customers compelling benefits, including lowering TCO for Windows Server and AD administration, and improved security.

Removing Windows SharePoint Services 3.0

As Sharepoint becomes mainstream, sometimes is nice to remember the little things. Recently we had a case where we had to do just that. We removed Sharepoint Services 3.0 and reinstaled it, only to notice the same info on the webpage. We did a little digging and came across an article from Microsoft pointing out that when removing Sharepoint Services 3.0, you have to manually remove the Windows Internal Database. With this version, there’s no way to remove it through the GUI and no user notification, so you have to use the msiexec.exe command to do it.
If you are running an x86-based edition of Microsoft Windows Server 2003, use the following command line to remove Windows Internal Database from the computer:
msiexec /x {CEB5780F-1A70-44A9-850F-DE6C4F6AA8FB}
CALLERID=ocsetup.exe

If you are running an x64-based edition of Windows Server 2003, use the following command line to remove Windows Internal Database from the computer:
msiexec /x {BDD79957-5801-4A2D-B09E-852E7FA64D01}
CALLERID=ocsetup.exe

The full Microsoft article (KB920277) can be found here.

Group Policy Settings References for Windows Server

Microsoft policy settings for computer and user configurations included in the Administrative template files delivered with the Windows operating systems specified. You can configure these policy settings when you edit Group Policy objects (GPOs).
These spreadsheets include the following categories of security policy settings: Account Policies (Password Policy, Account Lockout Policy, and Kerberos Policy), Local Policies (Audit Policy, User Rights Assignment, and Security Options), Event Log, Restricted Groups, System Services, Registry, and File System policy settings. The spreadsheets do not include security settings that exist outside of the Security Settings extension (scecli.dll), such as Wireless Network extension, Public Key Policies, or Software Restriction Policies.
http://tinyurl.com/ljxtvn

Real Time Event Notifications

IT admins don’t want small problems to snowball into an issue that can cause severe damage to a company’s infrastructure and Active Directory. They need a robust alert mechanism which identifies any threats in REAL TIME.  Most IT organizations are unaware of the changes until something breaks. This leads to downtime, loss of productivity, and higher cost. Becoming proactive and more aware is part of the overall IT optimization strategy.
Consider this scenario: An administrative account in Active Directory has been hacked or accessed by someone with malicious intent and you as the administrator of the network are not aware. Logging into an administrative account is an activity that is very critical and ignoring it could result in irreparable damage to your network security.
A reporting solution while outlining what happened and when, will do so after considerable time has passed, when it could be too late to be acted upon. The usual audit solutions will help you outline and analyze who made changes to what- after you’ve discovered the damage. What is needed is a proactive approach to AD security- a product that will let you know Who made What changes When and Where, in REAL TIME.  For such a product to work accurately, it cannot and should not rely only on Even Log information. The most reliable info is in Active Directory. The best solution in this case is to pull the data from both. Other changes in Active Directory might not necessarily require an administrators’ intervention, so adequate filtering is also needed.
Unmanaged changes are a problem in every company. They are THE primary cause of outages. If they are not prevented, the company will fail a security audit. However, even planned changes should be monitored to ensure that policies are being followed. Active Directory Change Notifier allows IT administrators to configure (define) alerts for one or more desired Active Directory events. Any alert is then delivered to the mailbox of intended recipients.
Active Directory Change Notifier is a flexible, scalable, easy to use application that will help you with your day-to-day activities. This application is part of our Active Directory solutions that are designed to simplify your IT environment and enable you to work better, faster, and more efficiently.