<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Active-Directory on Nicola Suter</title><link>https://tech.nicolonsky.ch/tags/active-directory/</link><description>Recent content in Active-Directory on Nicola Suter</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>© 2026 Nicola Suter</copyright><lastBuildDate>Fri, 19 Jul 2019 07:32:46 +0000</lastBuildDate><atom:link href="https://tech.nicolonsky.ch/tags/active-directory/rss.xml" rel="self" type="application/rss+xml"/><item><title>Automating network drive mapping configuration with Intune</title><link>https://tech.nicolonsky.ch/next-level-network-drive-mapping-with-intune/</link><pubDate>Fri, 19 Jul 2019 07:32:46 +0000</pubDate><guid>https://tech.nicolonsky.ch/next-level-network-drive-mapping-with-intune/</guid><description>&lt;p&gt;I&amp;rsquo;m thrilled to introduce the &lt;a href="https://intunedrivemapping.azurewebsites.net/DriveMapping" target="_blank" rel="noreferrer"&gt;intune-drive-mapping-generator&lt;/a&gt; which creates PowerShell scripts to map network drives with Intune. The tool is open source and built on ASP.NET Core MVC.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://intunedrivemapping.azurewebsites.net/DriveMapping" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="intune-drivemapping-generator"
 src="https://tech.nicolonsky.ch/content/images/2019/07/intune-drivemapping-generator.png"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The intune-drive-mapping-generator is your tool of choice to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Generate an Intune PowerShell script to map network drives on Azure AD joined devices&lt;/li&gt;
&lt;li&gt;Seamlessly migrate existing network drive mapping group policies&lt;/li&gt;
&lt;li&gt;Generate a network drive mapping configuration from scratch&lt;/li&gt;
&lt;li&gt;Use an existing Active Directory group as a filter to deploy all your drive mapping configurations within one script&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;This all happens without scripting effort. You receive a fully functional PowerShell script for the deployment with Intune.&lt;/em&gt;&lt;/p&gt;

&lt;h2 class="relative group"&gt;Architecture
 &lt;div id="architecture" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#architecture" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;This tool is designed to work best with the following components although it can be useful for other purposes(?) :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Azure AD Joined and Intune enrolled Windows 10 devices&lt;/li&gt;
&lt;li&gt;Synced user account from Active Directory to Azure Active Directory (Azure AD Connect)&lt;/li&gt;
&lt;li&gt;On-premises file servers&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 class="relative group"&gt;Howto
 &lt;div id="howto" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#howto" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;

&lt;h3 class="relative group"&gt;Export existing group policy
 &lt;div id="export-existing-group-policy" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#export-existing-group-policy" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;To convert your existing drive mapping group policy configuration, save the GPO as XML report with the group policy management console.&lt;/p&gt;</description></item><item><title>Surface Hub Miracast Connection Error</title><link>https://tech.nicolonsky.ch/surface-hub-miracast-connection-error/</link><pubDate>Fri, 05 Jan 2018 10:48:59 +0000</pubDate><guid>https://tech.nicolonsky.ch/surface-hub-miracast-connection-error/</guid><description>&lt;p&gt;Recently I had to troubleshoot a sticky Surface Hub Miracast Connection error for a customer. They were unable to connect to the surface hub from domain joined devices but a newly installed device from a blank Windows image was working as expected. I started Troubleshooting the Surface Hub Miracast Connection Error and checked all the points mentioned in the official &lt;a href="https://docs.microsoft.com/en-us/surface-hub/miracast-troubleshooting" target="_blank" rel="noreferrer"&gt;Troubleshoot Miracast on Surface Hub&lt;/a&gt; post from Microsoft.&lt;/p&gt;
&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="SurfaceHub"
 src="https://nicolonskytech.azurewebsites.net/content/images//2018/01/SurfaceHub-300x141.png"
 &gt;&lt;/figure&gt;

&lt;h2 class="relative group"&gt;Default Configuration
 &lt;div id="default-configuration" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#default-configuration" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;On a Windows 10 1709 device exists a default firewall rule to allow Miracast connections to wireless displays:&lt;/p&gt;
&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="Miracast"
 src="https://nicolonskytech.azurewebsites.net/content/images//2018/01/MiracastRuleDefault-1024x34.png"
 &gt;&lt;/figure&gt;
&lt;p&gt;But the connection attempt was still interrupted after a timeout.&lt;/p&gt;

&lt;h2 class="relative group"&gt;Looking trough Group Policy
 &lt;div id="looking-trough-group-policy" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#looking-trough-group-policy" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;After analyzing the Windows 10 Security Baseline Group Policy configuration I came across the following settings:&lt;/p&gt;
&lt;p&gt;Computer Configuration &amp;gt; Windows Settings &amp;gt; Security Settings &amp;gt; Windows Firewall with Advanced Security:&lt;/p&gt;
&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="Surface Hub Miracast Connection Error"
 src="https://nicolonskytech.azurewebsites.net/content/images//2018/01/FirewallGpoSettings.png"
 &gt;&lt;/figure&gt;
&lt;p&gt;In the settings for the public profile under the &amp;ldquo;Customize&amp;rdquo; section there&amp;rsquo;s a section called &amp;ldquo;&lt;strong&gt;Rule merging&lt;/strong&gt;&amp;rdquo;:&lt;/p&gt;
&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="Surface Hub Miracast Connection Error"
 src="https://nicolonskytech.azurewebsites.net/content/images//2018/01/RuleMerging.png"
 &gt;&lt;/figure&gt;
&lt;p&gt;As you can see rule merging is turned of in the Windows 10 Security Baseline which means, **all locally configured firewall rules are being ignored for the public profile. **Because Miracast connections or connection attempts belong to the public profile of the Windows Firewall, the built-in local firewall rule gets always bypassed.&lt;/p&gt;</description></item><item><title>Windows 10 1709 Cannot Access SMB2 Share Guest Access</title><link>https://tech.nicolonsky.ch/windows-10-1709-cannot-access-smb2-share-guest-access/</link><pubDate>Thu, 19 Oct 2017 17:51:57 +0000</pubDate><guid>https://tech.nicolonsky.ch/windows-10-1709-cannot-access-smb2-share-guest-access/</guid><description>&lt;p&gt;After Upgrading to Windows 10 1709 (Fall Creators Update) I couldn&amp;rsquo;t access my Synology NAS anymore. Therefore I started troubleshooting the Windows 10 1709 Cannot Access SMB2 Share Guest Access error:&lt;/p&gt;
&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="Windows 10 1709 Cannot Access SMB2 Share Guest Access"
 src="https://tech.nicolonsky.ch/content/images/2017/10/2017-10-19_1725-300x171.png"
 &gt;&lt;/figure&gt;
&lt;blockquote&gt;&lt;p&gt;An error occurred while reconnecting X: to &lt;code&gt;\\nas\data&lt;/code&gt;
Microsoft Windows Network: You can&amp;rsquo;t access this shared folder because your organization&amp;rsquo;s security policies block unauthenticated guest access. These policies help protect your PC from unsafe or malicious devices on the network.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 class="relative group"&gt;Cause
 &lt;div id="cause" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#cause" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;Starting with Windows 10 1709, Windows prevents you from accessing network shares with guest access enabled. Guest access means connecting to network shares without authentication, using the built-in &amp;ldquo;guest&amp;rdquo; account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This has no reference to the SMB1 protocol which was disabled in the latest Windows 10 release.&lt;/strong&gt;&lt;/p&gt;

&lt;h2 class="relative group"&gt;Resolution
 &lt;div id="resolution" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#resolution" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;To enable guest access again, configure the following GPO:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Computer configuration &amp;gt; administrative templates &amp;gt; network &amp;gt; Lanman Workstation: &amp;quot;Enable insecure guest logons&amp;quot; = Enabled&lt;/code&gt;&lt;/p&gt;
&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="Windows 10 1709 Cannot Access SMB2 Share Guest Access"
 src="https://tech.nicolonsky.ch/content/images/2017/10/2017-10-19_1740-1024x726.png"
 &gt;&lt;/figure&gt;

&lt;h3 class="relative group"&gt;Registry Key
 &lt;div id="registry-key" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#registry-key" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;The according registry key is located under:&lt;/p&gt;</description></item><item><title>Manage Local Administrator Rights Using Group Policy</title><link>https://tech.nicolonsky.ch/manage-local-administrator-rights-using-group-policy/</link><pubDate>Sat, 14 Oct 2017 13:37:49 +0000</pubDate><guid>https://tech.nicolonsky.ch/manage-local-administrator-rights-using-group-policy/</guid><description>&lt;p&gt;If you imagine that your users or administrators have uncontrolled local administrator rights it&amp;rsquo;s a nightmare. They have (certainly) full control over their computer, and could do a lot of harm. So managing local administrator rights is definitely a must.&lt;/p&gt;

&lt;h1 class="relative group"&gt;Manage Local Administrator Rights
 &lt;div id="manage-local-administrator-rights" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#manage-local-administrator-rights" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h1&gt;
&lt;p&gt;The Active Directory Group Policies offer a great possibility to manage local groups on clients or servers. All the magic happens with &amp;ldquo;Restricted Groups&amp;rdquo;.&lt;/p&gt;

&lt;h3 class="relative group"&gt;Adding a group or users to a local group
 &lt;div id="adding-a-group-or-users-to-a-local-group" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#adding-a-group-or-users-to-a-local-group" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;If you want to add a certain group to a built-in group add the group to the restricted groups under the &amp;ldquo;This group is a member of&amp;rdquo; sections:&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt="Group Policy Restricted Groups"
 src="https://tech.nicolonsky.ch/content/images//2017/10/2017-10-13_2326.png"
 &gt;&lt;/figure&gt;
&lt;/p&gt;
&lt;p&gt;When the GPO is no longer applied, the restricted group is being removed from the clients.&lt;/p&gt;

&lt;h3 class="relative group"&gt;Overwrite local group members
 &lt;div id="overwrite-local-group-members" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#overwrite-local-group-members" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h3&gt;
&lt;p&gt;When you wan&amp;rsquo;t take full control over a local group, you can choose the &amp;ldquo;Members of this group&amp;rdquo; option. Then all group members are replaced with the specified users or groups here, except the built-in local Administrator account.&lt;/p&gt;</description></item></channel></rss>