Skip to content

Thoughts on many things Posts

AD: Inspecting object attributes

A little while ago, I was asked about when a specific user last logged in with their active directory (AD) user account. While looking up that information was easily done, finding out how to look up the information was a mite more challenging. There are a number of ways of achieving it; including command line and Powershell commands. My preferred way of doing it is using the Attribute Editor in Active Directory Users and Computers (ADUC). Here’s how:

Leave a Comment

Excel: Highlight duplicates

Among my many areas of responsibility at work, is contacting all the users found in various data breach lists that our InfoSec team get their hands on (typically, these are the same lists that eventually make their way to HIBP). Not unsurprisingly, there is a significant amount of overlap between some of these lists, and one of the things I do is to ensure that I do not contact users about passwords I’ve already talked to them about.

Leave a Comment

Change is high-risk behavior. Nevertheless, it must be done

Change is arguably one of the riskiest behaviors within IT. Whenever we make a change, things tend to break. It is in no way coincidental that one of the foci of change management is post-change incidents, i.e. the errors introduced by the changes we make. I would go so far as to say that the only thing associated with higher risk than change is not changing.

Leave a Comment

View message headers

For most users, the message headers of any given email are irrelevant; the email has arrived, and that is all there is to say about that. It does, however, have applications both in IT support and in information security. While those applications are outside the scope of this article, accessing the message header is not.

Leave a Comment