{
  "version": "https://jsonfeed.org/version/1.1",
  "title": "activedirectory",
  "home_page_url": "https://evotec.xyz/de/tags/activedirectory",
  "feed_url": "https://evotec.xyz/de/tags/activedirectory/index.feed.json",
  "description": "Evotec Main Website",
  "items": [
    {
      "id": "https://evotec.xyz/de/blog/mastering-active-directory-hygiene-automating-sidhistory-cleanup-with-cleanupmonster",
      "url": "https://evotec.xyz/de/blog/mastering-active-directory-hygiene-automating-sidhistory-cleanup-with-cleanupmonster",
      "title": "Mastering Active Directory Hygiene: Automating SIDHistory Cleanup with CleanupMonster",
      "summary": "Security Identifier (SID) History is a useful mechanism in Active Directory (AD) migrations. It allows users and groups in a new domain to retain access to resources that still rely on permissions from the old domain. However, once migrations are completed, these historical SIDs can become clutter, posing both security and administrative challenges. While it\u2019s best to remove unnecessary SID History as soon as you\u2019re done migrating, many environments skip this step. Over time, decommissioned or broken trusts make cleanup more difficult, and domain objects can accrue so many old entries that you lose track of what is still required.",
      "date_published": "2025-03-16T18:47:45.0000000Z",
      "tags": [
        "Active Directory",
        "activedirectory",
        "cleanup",
        "powershell"
      ]
    },
    {
      "id": "https://evotec.xyz/de/blog/visually-display-active-directory-trusts-using-powershell",
      "url": "https://evotec.xyz/de/blog/visually-display-active-directory-trusts-using-powershell",
      "title": "Visually display Active Directory Trusts using PowerShell",
      "summary": "Active Directory Trusts are useful to connect one or more domains. But as useful those are, they can be very dangerous. Also, keeping trusts working and in good shape should be a top priority for Active Directory Admins. While there is a couple of command in the Active Directory module Get-ADTrust, I thought I would try and write my own that checks a few more things. I want to thank Chris Dent for his input on the part of this command. His binary skills amaze me!",
      "date_published": "2020-09-14T13:44:10.0000000Z",
      "tags": [
        "Active Directory",
        "activedirectory",
        "adessentials",
        "get-winadtrust",
        "powershell",
        "pswritehtml",
        "show-winadtrust"
      ]
    }
  ]
}