Recently I posted a couple of screenshots of the new version of AD Tidy that I’m currently working on, and in this post I’m going to explain more about the new features and capabilities of this new version.
This release includes a few minor enhancements to both editions, along with the ability to export to native Excel XLSX file in the standard edition.
This new version of my free MSA management tool includes support for the new Group MSA type accounts introduced in Windows Server 2012, along with some other improvements.
I’ve hit a bit of a stumbling block in updating my Managed Service Accounts GUI application, so while I continue trying to resolve that issue I thought I would update my tool for reporting on credentials used to run services and scheduled tasks. Full list of changes below.
I’m sure some of you will have noticed I’ve been a little quiet recently, not posting many blog posts and not releasing many updates or new tools. This is mainly because I have been struggling to find time to do both my full time job working as a network/system admin as well as putting in all the time required to update and release my software. So… I’ve decided to quit my job and now intend to focus on developing applications!
The first official non-BETA version of my Managed Service Account GUI tool is now available to download, and best of all it’s completely free!
Just thought I’d make a little video explaining how group policy works. This includes details of where GPOs are stored, how client side extensions are used, and a few general tips and tricks.
This is a video showing how I created a program that someone recently requested, hopefully if people find these development diary style videos interesting then I will do more as I make more programs (so please let me know what you think!).
A free tool for creating and editing Managed Service Accounts, with no Powershell knowledge required. What is a Managed Service Account? They are a special type of domain account in Windows Server 2008 R2 that can be used to run Windows services, but unlike normal domain accounts you don’t have to keep changing the password to keep things secure – Active Directory will take care of managing the password for you and communicating this with the computer that is using the Managed Service Account (you don’t even have to restart the services for the password change to take effect). Pretty useful, but unfortunately the only way to create and configure these accounts is via Powershell… until now.
For the last week or so I’ve been working on a new application that will let you easily find services and scheduled tasks running on servers in your domain that are using a specific user account, then you can have the application change those credentials to use an updated password or a completely different account. More info and screenshots below…