News

Microsoft Releases AD Client Extension

Microsoft has developed an extension for Windows NT 4.0 that allows this platform to take advantage of Windows 2000 Active Directory (AD) features.

Microsoft has developed an extension for Windows NT 4.0 that allows this platform to take advantage of Windows 2000 Active Directory (AD) features. The “Active Directory Client for Windows NT 4.0” extension enables:

  • Site awareness (log on to the domain controller closest to the client in a network, change passwords on any Win2K-based domain controller)
  • AD Service Interfaces (allow scripting to AD and provide a common programming API to AD programmers)
  • DFS fault tolerance client (provides access to Win2K distributed file system fault tolerant and fail-over file shares specified in AD)
  • AD Windows Address Book property pages (enables changing of properties on user objects)
  • NTLM v.2 authentication (client extension takes advantage of NTLM v.2 authentication features).

For more information on the NT 4.0 client extension and to download, go to www.microsoft.com/windows2000/news/bulletins/adextension.asp.

Microsoft Corp., Redmond, Washington, www.microsoft.com.

Featured

  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.