<?xml version="1.0" encoding="utf-8" ?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>SelfADSI Tutorial</title>
		<link>http://www.selfadsi.org</link>
		<description>New SelfADSI Tutorial Articles</description>
		<language>en-en</language>
		<copyright>Philipp Foeckeler, philipp.foeckeler@cerrotorre.de</copyright>
		<image>
			<url>http://www.selfadsi.org/img/general/icon-selfadsi.png</url>
			<title>SelfADSI Tutorial</title>
			<link>http://www.selfadsi.org</link>
		</image>
		<atom:link href="http://www.selfadsi.org/selfadsi-rss-en.xml" rel="self" type="application/rss+xml"/>
		<item>
			<title>LEX - The LDAP Explorer : New version 1.5.003 is based on .NET Framework 4.x</title>
			<description>The new version 1.5.003 of the LDAP browser / LDAP admin tool &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; is available. It comes with a few bugfixes and also is based on .NET Framework 4.x now. So LEX can be used on Windows 8.1 , Windows 10 or Windows Sevrer 2012 R2 without installing any additional runtime environment.</description>
			<link>http://www.ldapexplorer.com/en/download.htm</link>
			<pubDate>Fri, 07 May 2016 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/screenshots-1.5.003.htm</guid>
		</item>			
	    <item>
			<title>New SelfADSI Tutorial article: AD Permissions - The AdminSDHolder Mechanism</title>
			<description>A new article in the SelfADSI tutorial is dedicated to the strange effect that for some Active Directory objects, the permissions suddenly seem to be missing. The inheritance of obejct rights is deactivated and is automatically disabled over and over again, even if you tried to correct this by hand. The reason: The AdminSDHolder mechanism is trying to avoid changes for so-called protected objects. SelfADSI explains everything important to this mechanism and gives a script example to search for blocked inheritance in the AD environment.
</description>
			<link>http://www.selfadsi.org/extended-ad/ad-permissions-adminsdholder.htm</link>
			<pubDate>Thu, 23 Jan 2014 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/ad-permissions-adminsdholder.htm</guid>
		</item>				
		<item>
			<title>New LEX tutorial screencast video: How to transfer values from one attribute to another for many objects</title>
			<description>A new LEX tutorial video was released: It demonstrates the usage of the multi object editor. &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; can access a lot of objects simultaneously with this editor. In our example, the contents of an LDAP attribute have to be transferred to another attribute - for many many objects. A task that cannot be performed manually. Easily solved with LEX without having to develop a script.</description>
			<link>http://www.ldapexplorer.com/en/videos.htm#AttributeBulkTransfer</link>
			<pubDate>Sat, 10 Nov 2012 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/videos.htm#AttributeBulkTransfer</guid>
		</item>			
		<item>
			<title>LEX - The LDAP Explorer : Brand new version 1.4.000 is available</title>
			<description>The new version 1.4.000 of the LDAP browser / LDAP admin tool &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; is available. LEX now has an ability to monitor in real time an object on multiple LDAP servers. This is e.g. very useful if you want to have a closer look at the process of a replication. You can observe an object or important attributes of an object in the Observation Factory so that you can see exactly when and where the appropriate changes were made to the directory data. In the observation Factory, you can check for example whether one of your AD domain controllers replicated properly with the other. Or you could watch in which time interval and with what order objects are changed during the synchronization between different meta directories.</description>
			<link>http://www.ldapexplorer.com/en/screenshots-1.4.000.htm</link>
			<pubDate>Mon, 08 Oct 2012 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/screenshots-1.4.000.htm</guid>
		</item>			
	    <item>
			<title>New SelfADSI Tutorial article: Script examples for setting permission in the Active Directory</title>
			<description>After the last SelfADSI tutorial article has described the structure of NT Security Descriptors, now ther comes a practical demonstration in how to deal with object permissions in the Active Directory. In several VB scripts it is shown how to set or unset the option "User cannot change password" for an AD user account. Because this option is not controlled by an attribute, but directly by the user's permissions.</description>
			<link>http://www.selfadsi.org/extended-ad/ad-permissions-password-cannot-be-changed.htm</link>
			<pubDate>Thu, 27 Sep 2012 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.de/extended-ad/ad-permissions-password-cannot-be-changed.htm</guid>
		</item>			
		<item>
			<title>New LEX tutorial screencast video: How to use attribute columns in LDAP object lists</title>
			<description>The first LEX tutorial video was released: It demonstrates the handling of attribute columns in LDAP object lists when you browsing a directory with the LDAP browser LEX. Attribute columns gives you a very quick overview over object properties and let you sort the objects easily according to any attribute values.</description>
			<link>http://www.ldapexplorer.com/en/videos.htm</link>
			<pubDate>Tue, 12 Juni 2012 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/videos.htm-1</guid>
		</item>			
		<item>		
			<title>LEX - The LDAP Explorer : New version 1.3.005 is available</title>
			<description>The new version 1.3.005 of the LDAP browser / LDAP admin tool &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; is available. In this version, new LDAP syntax and data converter tool are introduced, among other improvements for general performance and stability.</description>
			<link>http://www.ldapexplorer.com/en/screenshots-1.3.005.htm</link>
			<pubDate>wed, 09 May 2011 14:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/screenshots-1.3.005.htm</guid>		
		</item>				
	    <item>
			<title>New SelfADSI Tutorial article about  Microsoft Security Descriptors and AD permissions</title>
			<description>This new article in the SelfADSI tutorial describes the design of Microsoft Security Descriptor values. An example of such a value is the AD attribute 'ntSecurityDescriptor'. Here you can evaluate or set the complex permissions to AD objects - but only if you know the intricate details of the security descriptor, the contained ACLs (Access Control List) and ACEs (Access Control Entries). The article gives sript examples how to read or set or remove permissions on. Of course this includes the decoding of extended rights and property sets!</description>
			<link>http://www.selfadsi.org/deep-inside/ad-security-descriptors.htm</link>
			<pubDate>Wed, 25 Apr 2012 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.de/deep-inside/ad-security-descriptors.htm</guid>
		</item>			
		<item>
			<title>LEX - The LDAP Explorer : New version 1.3.005 is available</title>
			<description>The new version 1.3.005 of the LDAP browser / LDAP admin tool &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; is available. In this version, new LDAP syntax and data converter tool are introduced, among other improvements for general performance and stability.</description>
			<link>http://www.ldapexplorer.com/en/screenshots-1.3.005.htm</link>
			<pubDate>Sun, 29 May 2011 14:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/screenshots-1.3.005.htm</guid>
		</item>				
		<item>
			<title>New SelfADSI Tutorial article about the pwdLastSet attribute</title>
			<description>This new SelfADSI tutorial article describes the LDAP attribute pwdLastSet. This attribute represents the exat timestamp of the last password change for the regarding Active Directory account. Since this attribute is stored as a Microsoft Integer-8 value (100-nanosecond steps since 01/01/1600...), is needs some effort to handle this value in scripts. The article gives sript examples how to convert theses values into readable date and times or how to search for users whose password wasn't change for a certain period of time.</description>
			<link>http://www.selfadsi.org/ads-attributes/user-pwdLastSet.htm</link>
			<pubDate>Sun, 20 Feb 2011 08:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/ads-attributes/user-pwdLastSet.htm</guid>
		</item>			
		<item>
			<title>LUMAX v1.0 - A free tool for Active Directory user maintenance</title>
			<description>Today I released the first public version of LUMAX, our new free GUI tool for Active Directory user/account maintenance. LUMAX lets you easily create reports of important AD account information like Real Last Last Logon Time, Lockout State, Creation Date, Password Expiry Date, Fine Grained Password Policy State and much more... Convenient ways to highlight, filter, sort and export these information. LUMAX comes with pre-defined account filters like these:&lt;ul&gt;&lt;li&gt;show only accounts that are disabled&lt;/li&gt;&lt;li&gt;show only accounts that are locked&lt;/li&gt;&lt;li&gt;show only accounts which did log on in the last hour / day / week...&lt;/li&gt;&lt;li&gt;show only accounts which did NOT log on for a week / six months / a year...&lt;/li&gt;&lt;li&gt;show only accounts which never logged on&lt;/li&gt;&lt;li&gt;show only accounts whose password was never changed / not changed in the last 2 weeks / 4 weeks / 6 months&lt;/li&gt;&lt;li&gt;show only accounts which are subjec to a fine-grained password policy&lt;/li&gt;&lt;li&gt;show only accounts whose password will expire today / in the next two days / is already expired / will never expire&lt;/li&gt;&lt;/ul&gt;...and many more. The tool also allows you to log on over LDAP/LDAP SSL to any domain with credentials.&lt;br /&gt;&lt;br /&gt;LUMAX is a free child project in the development of the commercial LDAP browser '&lt;strong&gt;LEX The LDAP Explorer&lt;/strong&gt;'..</description>
			<link>http://www.ldapexplorer.com/en/lumax.htm</link>
			<pubDate>Sun, 09 Jan 2011 15:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/lumax.htm-1.0</guid>
		</item>			
		<item>
			<title>How to search and find hidden recipients in an Exchange environment per script</title>
			<description>This is a new article in the '&lt;strong&gt;&lt;a href=&quot;http://www.selfadsi.org/extended-ad/search-factory.htm&quot;&gt;LDAP search factory&lt;/a&gt;&lt;/strong&gt;' section of the SelfADSI tutorial. It provides script examples demonstrating the search for Exchange mail recipients which are hidden from the adress book.</description>
			<link>http://www.selfadsi.org/extended-ad/search-hidden-recipients.htm</link>
			<pubDate>Sun, 05 Dec 2010 18:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/search-hidden-recipients.htm</guid>
		</item>				
		<item>
			<title>New Version of LIZA, the free tool for Active Directory Security, Permission and ACL Analysis</title>
			<description>I made a new version of LIZA available for download. Liza is a free tool for analysis of AD object permissions. The new release is 1.4 now. The new version fixes some minor issues in dealing with AD LDS directories. Another reason: LIZA is an offshoot of &lt;a href=&quot;http://www.ldapexplorer.com&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt;&lt;/a&gt; (my commercial LDAP browser and administration tool). If LIZA is installed on the same computer as LEX, then LIZA can share connection profiles and the directory cache with LEX. The new version LIZA is needed to integrate smoothly with the latest LEX version 1.3.02.</description>
			<link>http://www.ldapexplorer.com/en/liza.htm</link>
			<pubDate>Wed, 01 Dec 2010 17:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/liza.htm-1.4</guid>
		</item>			
		<item>
			<title>New Version of LAZARUS, the free tool for Active Directory Deleted Object Recovery</title>
			<description>I made a new version of LAZARUS available for download. Liza is a free tool for accessing the deleted obejcts container and recovery for deleted objects in AD environments. The new release is 1.6 now. The new version fixes some minor issues in dealing with AD LDS directories. Another reason: LAZARUS is an offshoot of &lt;a href=&quot;http://www.ldapexplorer.com&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt;&lt;/a&gt; (my commercial LDAP browser and administration tool). If LAZARUS is installed on the same computer as LEX, then LAZARUS can share connection profiles and the directory cache with LEX. The new version LAZARUS is needed to integrate smoothly with the latest LEX version 1.3.02.</description>
			<link>http://www.ldapexplorer.com/en/lazarus.htm</link>
			<pubDate>Wed, 17 Nov 2010 15:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/lazarus.htm-1.6</guid>
		</item>			
		<item>
			<title>Attributes for controlling the Ad replication: uSNCreated and uSNChanged</title>
			<description>A new tutorial article describes the two object attributes &lt;strong&gt;uSNCreated&lt;/strong&gt; and &lt;strong&gt;uSNChanged&lt;/strong&gt;. These are the local update sequence numbers (USN) for each domain controller at the time of the creation or the last modification of an object. For a better understanding of the importance of the USN values in the Active Directory replication, I've made a few videos which illustrate the processes in the AD replication.</description>
			<link>http://www.selfadsi.org/ads-attributes/user-usnCreated.htm</link>
			<pubDate>Mon, 01 Nov 2010 08:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/ads-attributes/user-usnCreated.htm</guid>
		</item>			
		<item>
			<title>LEX - The LDAP Explorer : New version 1.3.002 is available</title>
			<description>The new version 1.3.002 of the LDAP browser / LDAP admin tool &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; is available. In this version, many improvements in the handling of LDAP filters and directory search operations were introduced. LEX can create now for example from a list of names, email addresses or other attributes very easyly a proper LDAP filter for the display of the regardin objects. Just copy the list to the clipboard (also from an Excel spreadsheet) and paste it into the search dialog or in the LEX Pipe Factory...</description>
			<link>http://www.ldapexplorer.com/en/screenshots-1.3.002.htm</link>
			<pubDate>Sun, 24 Oct 2010 14:00:00 GMT</pubDate>
			<guid>http://www.ldapexplorer.com/en/screenshots-1.3.002.htm</guid>
		</item>			
		<item>
			<title>How to search and find user accounts in Active Directory</title>
			<description>In most cases in which  I see sample scripts for LDAP searchoperations for Active Directory users, the following LDAP filter is used: &lt;em&gt;(&amp;amp;(objectClass=user)(objectCategory=person))&lt;/em&gt;. However, this is not the optimal method to search for user accounts. This filter syntax causes an unnecessary amount of server performance consumption. This tutorial article shows a more efficient LDAP filter for the user objects search - and provides several example scripts which demonstrate the use of this filter (all users in the own domain, the own forest and so on)</description>
			<link>http://www.selfadsi.org/extended-ad/search-user-accounts.htm</link>
			<pubDate>Sun, 26 Sep 2010 09:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/search-user-accounts.htm</guid>
		</item>				
		<item>
			<title>How to find all members of an Active Directory group</title>
			<description>In Active Directory Scripts the members of a group are searched often by binding to the regarding group object and evaluating it's API property &lt;strong&gt;members&lt;/strong&gt; or  LDAP attribute &lt;strong&gt;member&lt;/strong&gt; - or by evaluating the 'opposite' user attribute &lt;strong&gt;memberOf&lt;/strong&gt;. However, this is not exactly the same, because group memberships can be implemented not only through this attribute pair, but also in the form of 'primary groups', this is set in the user  attribute &lt;strong&gt;primaryGroupID&lt;/strong&gt;. So the actual group membership of a directory object consists  always  of two attributes!&lt;br&gt;&lt;br&gt;By default, for new users  the primary group property is set to 'domain users', so it is often not important that this group membership is missing in the basic evaluation of the member values. However, if other groups are registered as a primary group, this traditional way of membership evaluation is not accurate enough! Therefore, this article  describes next to the qick-and-dirty method also how to determine a &lt;em&gt;complete&lt;/em&gt; list of the members of a group. </description>
			<link>http://www.selfadsi.org/extended-ad/search-group-members.htm</link>
			<pubDate>Sat, 11 Sep 2010 12:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/search-group-members.htm</guid>
		</item>	
		<item>
			<title>Description for the LDAP attributes of an Active Directory Contact object</title>
			<description>Today i added the attribute description for Active Directory contact objects to the SelfADSI tutorial. For a long time now, the corresponding topics for the &lt;a href=&quot;http://www.selfadsi.org/user-attributes.htm&quot;&gt;LDAP attributes for AD users&lt;/a&gt; and &lt;a href=&quot;http://www.selfadsi.org/group-attributes.htm&quot;&gt;LDAP attributes for AD groups&lt;/a&gt;are among the most-wanted topics of the tutorial, so it was logical to round out this section. Once again I tried to show the LDAP attribute names for all the fields in the admin GUIs:&lt;br /&gt;&lt;table width=&quot;96%&quot; align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tr&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/contact-attributes-w2k8.htm&quot;&gt;Windows 2008&lt;br /&gt;AD Users and Computers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/contact-attributes-w2k3.htm&quot;&gt;Windows 2000 /&lt;br /&gt;Windows 2003&lt;br /&gt;AD Users and Computers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/attributes-e2k3.htm#ContactAttributes&quot;&gt;Exchange 2003&lt;br /&gt;AD Users and Computers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;p&gt;&lt;a href=&quot;http://www.selfadsi.org/attributes-e2k7.htm#ContactAttributes&quot;&gt;Exchange 2007&lt;br /&gt;Exchange Management&lt;br /&gt;Console&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/contact-attributes-w2k8.htm&quot;&gt;&lt;img src=&quot;http://www.selfadsi.org/img/tutorial/ads-w2k8-user-attributes-mini.png&quot; alt=&quot;ADS User und Computer 2008&quot; width=&quot;150&quot; height=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/contact-attributes-w2k3.htm&quot;&gt;&lt;img src=&quot;http://www.selfadsi.org/img/tutorial/ads-contact-attributes-mini.png&quot; alt=&quot;ADS User und Computer 2000/2003&quot; width=&quot;173&quot; height=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/attributes-e2k3.htm#ContactAttributes&quot;&gt;&lt;img src=&quot;http://www.selfadsi.org/img/tutorial/exchange2003-contact-attributes-mini.png&quot; alt=&quot;ADS User und Computer - Exchange 2003&quot; width=&quot;173&quot; height=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;td style=&quot;text-align:center&quot;&gt;&lt;a href=&quot;http://www.selfadsi.org/attributes-e2k7.htm#ContactAttributes&quot;&gt;&lt;img src=&quot;http://www.selfadsi.org/img/tutorial/exchange2007-user-attributes-mini.png&quot; alt=&quot;Exchange 2007 Management Console&quot; width=&quot;169&quot; height=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</description>
			<link>http://www.selfadsi.org/contact-attributes.htm</link>
			<pubDate>Thu, 19 Aug 2010 12:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/contact-attributes.htm</guid>
		</item>		
		<item>
			<title>LEX - The LDAP Explorer : New version 1.3.000 is available</title>
			<description>The new version 1.3.000 of my LDAP browser / LDAP admin tool &lt;strong&gt;LEX - The LDAP Explorer&lt;/strong&gt; is available. New features in this version: &lt;ul&gt;&lt;li&gt;The new Pipe Factory is integrated now: Launch any script or application directly from an objects context menu and pass the distinguished name as a command line parameter: You can build your own plug-ins now for directory object handling.&lt;/li&gt;&lt;li&gt;LEX can handle linked attribute now - just as an OpenLDP 'memberOf' overlay would do: If you change values of a linked atribute (eg like 'member' or 'memberOf'), LEX changes the appropriate linked attribute value at the regarding reference/backlink object also. Works also for system-reserved backlink attributes which are normally readonly: You can change for example the 'memberOf' attribute in Active Directory environments now just like a normal attribute.&lt;/li&gt;&lt;li&gt;...and many minor improvments, including an editor for GUID values.&lt;/li&gt;&lt;/ul&gt;</description>
			<link>http://www.ldapexplorer.com/en/screenshots-1.3.000.htm</link>
			<pubDate>Wed, 21 Jul 2010 20:00:00 GMT</pubDate>
			<guid>http://www.ldapexplorer.com/en/screenshots-1.3.000.htm</guid>
		</item>		
		<item>
			<title>Name Translation : How to detect the LDAP path of a user</title>
			<description>... if you know only the user's logon name. A Tutorial for the usage of the &lt;strong&gt;IADsNameTranslate&lt;/strong&gt; Interface in a VB script. This allows NetBIOS logon name (sAMAccountName) and UPN (User Principal Name) to be converted easily in the full LDAP path of that user accounts - this LDAP path (Distinguished Name) is needed to access the directory object.</description>
			<link>http://www.selfadsi.org/extended-ad/name-translation.htm</link>
			<pubDate>Sat, 17 Jul 2010 14:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/name-translation.htm</guid>
		</item>			
		<item>
			<title>Script Example: Is this domain controller a global catalog?</title>
			<description>A small example script that can be tested for a given domain controller, whether it is a global catalog server in Active Directory. This LDAP script examines the specific options in the configuration partition.</description>
			<link>http://www.selfadsi.org/global-catalog-check.htm</link>
			<pubDate>Thu, 15 Jul 2010 22:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/global-catalog-check.htm</guid>
		</item>
		<item>
			<title>Script Tutorial: LDAP Search operations in the AD global catalog</title>
			<description>A new article in the SelfADSI tutorial: It demonstrates how to perform an LDAP search operation on the global catalog. This enables you to find objects in the entire Active Diectory forest with specific search criteria. With detailed example scripts for different situations (LDAP search with or without credentials, GC search with SSL, and search when you don't know the name of yor own domain / forest).</description>
			<link>http://www.selfadsi.org/global-catalog-ldap-search.htm</link>
			<pubDate>Sat, 10 Jul 2010 14:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/global-catalog-ldap-search.htm</guid>
		</item>			
		<item>
			<title>How to connect to gobal catalog objects in a script</title>
			<description>A new article in the SelfADSI tutorial: It demonstrates how to perform an LDAP BIND operation on an object in the global catalog. This is neccessary to read data from the Active Director GC with scripts. With detailed example scripts for different situations (access with or without credentials, serverless binding, GC-bind with SSL, and bind when you don't know the name of yor own domain / forest).</description>
			<link>http://www.selfadsi.org/global-catalog-bind.htm</link>
			<pubDate>Tue, 22 Jun 2010 15:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/global-catalog-bind.htm</guid>
		</item>	
		<item>
			<title>How to detect the Name of the own Active Directory Domain</title>
			<description>This short article demonstrate how to detect in a script the different names of the domain to which the user running the script is logged in to: LDAP PFadname of the domain, NetBIOS domain name and full qualifierd DNS domain name.</description>
			<link>http://www.selfadsi.org/extended-ad/find-my-domain-name.htm</link>
			<pubDate>Tue, 15 Jun 2010 21:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/find-my-domain-name.htm</guid>
		</item>	
		<item>
			<title>How to search and find disabled Active Directory user accounts</title>
			<description>This is a new article in the '&lt;strong&gt;&lt;a href=&quot;http://www.selfadsi.org/extended-ad/search-factory.htm&quot;&gt;LDAP search factory&lt;/a&gt;&lt;/strong&gt;' section of the SelfADSI tutorial. It provides script examples demonstrating the search for disabled AD users.</description>
			<link>http://www.selfadsi.org/extended-ad/search-disabled-users.htm</link>
			<pubDate>Sun, 13 Jun 2010 18:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/search-disabled-users.htm</guid>
		</item>			
		<item>
			<title>Scripting the global catalog</title>
			<description>A new topic of the SelfADSI tutorial describes the scripting with the global catalog in Active Directory environments. For the moment, there are two sub topics available:&lt;br /&gt;&lt;br /&gt; &lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.selfadsi.org/global-catalog-howto-find.htm&quot;&gt;How to find a Global Catalog server?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.selfadsi.org/global-catalog-attributes.htm&quot;&gt;Which object attributes are included in the global catalog?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description>
			<link>http://www.selfadsi.org/global-catalog.htm</link>
			<pubDate>Sun, 06 Jun 2010 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/global-catalog.htm</guid>
		</item>			
		<item>
			<title>How to search and find locked Active Directory user accounts</title>
			<description>This is a new article in the '&lt;strong&gt;&lt;a href=&quot;http://www.selfadsi.org/extended-ad/search-factory.htm&quot;&gt;LDAP search factory&lt;/a&gt;&lt;/strong&gt;' section of the SelfADSI tutorial. It provides interesting script examples according the LDAP search for locked AD user accounts and how to calculate the remaining lockout time for each user. There's lots  of important attributes and properties regarding the lockout mechanism: &lt;strong&gt;lockoutDuration, lockoutTime, msDS-User-Account-Control-Computed, IsAccountLocked&lt;/strong&gt;... it's easy to get the most out of them if you know how!</description>
			<link>http://www.selfadsi.org/extended-ad/search-locked-users.htm</link>
			<pubDate>Wed, 26 May 2010 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.selfadsi.org/extended-ad/search-locked-users.htm</guid>
		</item>			
		<item>
			<title>New Version of LAZARUS, the free tool for AD deleted objects recovery</title>
			<description>Today i released a new version of LAZARUS, my tool for accessing the Active Directory 'deleted objects' container and restoring objects and subtrees. The current release is v1.5 now. I made a few changes which helps LAZARUS to better operate in AD LDS (ADAM) environments. Yes - deleted objects in AD LDS directories can be restored with Lazarus also! :) Just use the 'Connect' button, provide server address, LDAP port of the regarding instance und user credentials, and here we go...</description>
			<link>http://www.ldapexplorer.com/en/lazarus.htm</link>
			<pubDate>Tue, 25 May 2010 20:00:00 GMT</pubDate>
			<guid isPermaLink="false">http://www.ldapexplorer.com/en/lazarus.htm-2</guid>
		</item>			
		<item>
			<title>How to search and find Active Directory domain controllers</title>
			<description>The first topic website of my new tutorial subdivision '&lt;a href=&quot;http://www.selfadsi.org/extended-ad/search-factory.htm&quot;&gt;LDAP Search Factory&lt;/a&gt;' with the VBScript examples for finding all the domain controller is online. I have put much emphasis on showing how to start a general search in the own domain, with the name of this Domäen is first determined automatically. A further example shows the search in any other domain, or OU - where appropriate, with other credentials. Finally another example that automatically searches for all DCs in the entire AD forest - a demonstration of an LDAP search in the global catalog.</description>
			<link>http://www.selfadsi.org/extended-ad/search-domain-controllers.htm</link>
			<pubDate>Sat, 22 May 2010 14:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/extended-ad/search-domain-controllers.htm</guid>
		</item>
		<item>
			<title>New attribute descriptions for Active Directory users</title>
			<description>Step by step I complete the list of important attributes for LDAP Active Directory user accounts. New are topics for &lt;a href=&quot;http://www.selfadsi.de/ads-attributes/user-description.htm&quot;&gt;description&lt;/a&gt; and &lt;a href=&quot;http://www.selfadsi.de/ads-attributes/user-info.htm&quot;&gt;info&lt;/a&gt;. Admittedly, not the most interesting attributes. But the list is getting more complete, and I plan the next more interesting attributes to describe: uSNCreated, uSNChanged  pwdLastSet uind lockOutTime ...</description>
			<link>http://www.selfadsi.org/user-attributes.htm</link>
			<pubDate>Sat, 22 May 2010 13:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/user-attributes.htm</guid>
		</item>	
		<item>
			<title>The userAccountControl attribute for Active Directory users</title>
			<description>A tutorial article about the handling of userAccountControl, an important LDAP attribute for Active Directory user accounts. A lot of important information and status configuration regarding the account is provided by this value. Detailed descriptions of each flag in userAccountControl are given as well as script examples how you can set or erase single flags in your own scripts.</description>
			<link>http://www.selfadsi.org/ads-attributes/user-userAccountControl.htm</link>
			<pubDate>Mon, 10 May 2010 23:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/ads-attributes/user-userAccountControl.htm</guid>
		</item>	
		<item>
			<title>New Version of LIZA, the free tool for Active Directory Security, Permission and ACL Analysis</title>
			<description>Today i released a new version of Liza, my tool for analyzing AD permissions. The current release is v1.1 now. The new LIZA can display and analyse permissions not only for container objects, but also on any leaf object in Active Directory environments if needed.</description>
			<link>http://www.ldapexplorer.com/en/liza.htm</link>
			<pubDate>Sun, 25 Apr 2010 20:00:00 GMT</pubDate>
			<guid>http://www.ldapexplorer.com/en/liza.htm-1</guid>
		</item>	
		<item>
			<title>Scripting Novell ZENworks : Distribution Rules for Application Objecte</title>
			<description>Distribution Rules are very important when you are dealing with software deployment in a Novell ZENWorks environment. You can specify with these rules that an application is installed or available on a machine only if certain prerequisites are met. We have to deal with the LDAP attributes &lt;b&gt;'zenAppInventory', 'zenAppInventoryTree'&lt;/b&gt; and &lt;b&gt;'zenAppInventoryApplication'&lt;/b&gt;. These are binary fields - unfortunately, the content of these LDAP attributes and their relation to each other is not intuitively clear. I had to script the distribution rules for many ZEN application objects, but you cannot find any documentation to rule internals on the manufacturer's (Novell) website! So i had to pull some strings with old relationsships (once i worked as a developer for NetWare Server FDDI drivers...), and with a few lines of the original source code and a bit reverse engineering i tried to bring light into the ZENWorks jungle: This Article is the result.</description>
			<link>http://www.selfadsi.org/deep-inside/novell-zenapp-distribution-rules.htm</link>
			<pubDate>Mon, 19 Apr 2010 23:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/deep-inside/novell-zenapp-distribution-rules.htm</guid>
		</item>	
		<item>
			<title>LIZA v1.0 - A free tool for Active Directory Security, Permission and ACL Analysis</title>
			<description>Today i released the first public version of Liza, my new GUI tool for analyzing AD permissions. I always found the out-of-the-box possibilities to examine the object security in Active Directory environments rather unwieldy to handle for complex permission settings. So i made a tool for fast and lucid display of container permissions and audit configurations in Active Directory environments. What i added is an analysis option: Where in the directory hierarchy are permissions granted for an account (including it's group memberships)?</description>
			<link>http://www.ldapexplorer.com/en/liza.htm</link>
			<pubDate>Mon, 05 Apr 2010 20:00:00 GMT</pubDate>
			<guid>http://www.ldapexplorer.com/en/liza.htm</guid>
		</item>	
		<item>
			<title>Microsoft SIDs and how to handle them in LDAP scripts</title>
			<description>A tutorial article about Active Directory SID attributes, in which the structure of these Security Identifiers is explained in detail. Additionally it will be shown how to read the object SID from a AD account in a VBScript, and how to convert it into a readable SID SDDL string (S-1-5-21-.....). There are example scripts for LDAP filters which can be used to find objects with a certain SIDs (->evaluation of the 'tokenGroups' attribute!!) and examples how to bind to an account object using it's SID.</description>
			<link>http://www.selfadsi.org/deep-inside/microsoft-sid-attributes.htm</link>
			<pubDate>Wed, 10 Mar 2010 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/deep-inside/microsoft-sid-attributes.htm</guid>
		</item>
		<item>
			<title>LEX - The LDAP Explorer : New version 1.2.004 is available</title>
			<description>The new version of my commercial LDAP browser / LDAP admin tool is available. New features in this version: LEX can set passwords for AD acounts now. When you edit the object permissions, you can take ownership on AD objects now. Many new specific editors and functions for bit flag attributes: userAccountControl, dsHeuristics, systemFlags, searchFlags, groupType, sAMAccountType. OK, that was a bunch of improvements especially for AD environments, new functions for other LDAP directory servers or new general LDAP browser functions will come in the next version ;)</description>
			<link>http://www.ldapexplorer.com/en/screenshots-1.2.004.htm</link>
			<pubDate>Mon, 01 Mar 2010 21:00:00 GMT</pubDate>
			<guid>http://www.ldapexplorer.com/en/screenshots-1.2.004.htm</guid>
		</item>
		<item>
			<title>Deleting LDAP objects with ADSI and VBScript</title>
			<description>A tutorial article about deleting LDAP objects. Including examples how to delete entire subtress.</description>
			<link>http://www.selfadsi.org/delete.htm</link>
			<pubDate>Sun, 07 Feb 2010 13:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/delete.htm</guid>
		</item>	
		<item>
			<title>How to search for AD users which don't need a password _or_ whose password never expires</title>
			<description>The tutorial article about LDAP filters has been refreshed. The part which deals woth filter search in bit fields has been extended with new explanations and exmaples for logical OR search filters (LDAP_MATCHING_RULE_BIT_OR 1.2.840.113556.1.4.804).</description>
			<link>http://www.selfadsi.org/ldap-filter.htm#BitAndOr</link>
			<pubDate>Fri, 05 Feb 2010 17:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/ldap-filter.htm#BitAndOr</guid>
		</item>	
		<item>
			<title>How to unlock Active Directory User Accounts by script</title>
			<description>This article showy you how to unlock an account which was locked by the Active Directory intruder account lockout mechanism. We can use the API property 'IsAccountLocked' for this (old school) or we could use the Integer8 attribute 'lockoutTime', which would be more elegant.</description>
			<link>http://www.selfadsi.org/extended-ad/user-unlock.htm</link>
			<pubDate>Sun, 24 Jan 2010 17:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/extended-ad/user-unlock.htm</guid>
		</item>	
		<item>
			<title>LAZARUS v1.0 - A free tool for Active Directory deleted objects recovery</title>
			<description>Yesterday i released the first public version of Lazarus, my new GUI tool for accessing the hidden Active Directory container 'Deleted Objects'. This is where a domain controller (or ADAM/AD LDS server) stores the deleted directory objects for a while, before they get deleted physically from the Active Directory database. LAZARUS can reanimate these tombstones - if you activated the new AD Recycle Bin feature in your environment, then LAZARUS can undelete the objects with their full referential integrity (no more lost group memberships!). LAZARUS is a child project in the development of my LDAP browser 'LEX  The LDAP Explorer'.</description>
			<link>http://www.ldapexplorer.com/en/lazarus.htm</link>
			<pubDate>Wed, 13 Jan 2010 22:00:00 GMT</pubDate>
			<guid>http://www.ldapexplorer.com/en/lazarus.htm</guid>
		</item>	
		<item>
			<title>The lastLogonTimeStamp attribute for Active Directory users</title>
			<description>The lastLogonTimestamp attribute shows when a user did logon to an AD domain the last time - it is replicated to all domain controllers, but only after about 2 weeks. So the lastLogonTimestamp value is rather suitable to shows us the accounts which hasn't been active for a long time. Show this timestamp in a script and learn to handle these values. With this article, you can build easily LDAP filters like: &quot;Which users didn't logon to the domain for the last 6 months?&quot;.</description>
			<link>http://www.selfadsi.org/ads-attributes/user-lastLogonTimestamp.htm</link>
			<pubDate>Wed, 06 Jan 2010 22:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/ads-attributes/user-lastLogonTimestamp.htm</guid>
		</item>	
		<item>
			<title>The lastLogon attribute for Active Directory users</title>
			<description>Show the timestamp of the last authentication in a script and learn to handle these values.</description>
			<link>http://www.selfadsi.org/ads-attributes/user-lastLogon.htm</link>
			<pubDate>Fri, 25 Dec 2009 13:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.de/ads-attributes/user-lastLogon.htm</guid>
		</item>		
		<item>
			<title>Converting AD Large Integer / Integer8 values into date and time</title>
			<description>Script tutorial for the handling of such important Active Directory attributes as lastLogon, lastLogonTimestamp, pwdLastSet, lockOutDuration, ... and many more.</description>
			<link>http://www.selfadsi.org/deep-inside/microsoft-integer8-attributes.htm</link>
			<pubDate>Thu, 10 Dec 2009 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/deep-inside/microsoft-integer8-attributes.htm</guid>
		</item>	
		<item>
			<title>Writing LDAP Directory Object Attributes</title>
			<description>Writing LDAP Directory Object Attributes in ADSI scripts</description>
			<link>http://www.selfadsi.org/write.htm</link>
			<pubDate>Wed, 11 Nov 2009 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/write.htm</guid>
		</item>		
		<item>
			<title>Provider Specific Attributes</title>
			<description>How to deal with Provider Specific Attributes in ADSI LDAP scripts</description>
			<link>http://www.selfadsi.org/deep-inside/attribute-provider-specific.htm</link>
			<pubDate>Sun, 08 Nov 2009 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/deep-inside/attribute-provider-specific.htm</guid>
		</item>
		<item>
			<title>LDAP Object Attributes of type 'Octet String'</title>
			<description>Reading and writing LDAP attributes with binary data in scripts</description>
			<link>http://www.selfadsi.org/deep-inside/attribute-octetstring.htm</link>
			<pubDate>Sun, 25 Oct 2009 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/deep-inside/attribute-octetstring.htm</guid>
		</item>
		<item>
			<title>Renaming LDAP Directory Objects</title>
			<description>Renaming LDAP Directory Objects</description>
			<link>http://www.selfadsi.org/rename.htm</link>
			<pubDate>Sun, 27 Sep 2009 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/rename.htm</guid>
		</item>
		<item>
			<title>Reading LDAP Directory Object Attributes</title>
			<description>Reading LDAP Directory Object Attributes in ADSI scripts</description>
			<link>http://www.selfadsi.org/read.htm</link>
			<pubDate>Sat, 12 Sep 2009 20:00:00 GMT</pubDate>
			<guid>http://www.selfadsi.org/read.htm</guid>
		</item>
	</channel>
</rss>
