WLAN Security | The Best Practices

Wireless authentication process

Security in wireless network is a very essential and while designing a WLAN you have to focus and consider the following important aspects of security. 1EEE 802.11i/WPA2: In WLAN we have different security protocols for security. One of the famous protocol is WEP (Wired Equivalent Privacy) that emerge with 802.11b standard but it is faulty … Read more WLAN Security | The Best Practices

Recover the Archive Key in CA | Recover Loss certificates

I will show you how to recover the certificate using recovery agents. But make sure you have enabled certificate¬†archiving otherwise you are not able to recover the certificates. You can learn more about Key Archiving in Certificate services. You can convert a certificate into an importable form using recovery agent and then you can import … Read more Recover the Archive Key in CA | Recover Loss certificates

Auto enrollment of computer certificate

Computer certificate on MMC

In this article I shall show you how to auto enroll the computer certificates for active directory computers, this method is almost similar to auto enrollment of user certificate but you need a different group policy for computer certificates. Also i am using the same three systems as I was using in previous articles that … Read more Auto enrollment of computer certificate

Auto Enrollment of User Certificate in Active Directory

In Auto enrollment certificates are distributed automatically by certificate authority and user even not being aware that certificate enrollment is taking place. Normally certificates issued to computers and services are done by auto enrollment. Here I will show you how you can auto enroll the user certificate using certificate authority in active directory. You need … Read more Auto Enrollment of User Certificate in Active Directory

Configure Automatic Key Archiving in Certificate services| key recovery agent

CA is used for issuing the certificates base on certificate templates. Certificate template defines what is in a certificate, what type of encryption is used, what is key length, what type of technology (MD5, SHA etc) is used. When you are using certificate services then it is important to configure the key recovery agent so … Read more Configure Automatic Key Archiving in Certificate services| key recovery agent