Working around accounts that expire with AAD Connect: REDUX

When attempting to migrate a Microsoft 365 organization from federated authentication to Password Hash Sync, there are a couple of gotchas that can impact how you manage certain accounts.  These changes in authentication behavior determine whether you need to implement new workflows or business processes–changes surrounding expired accounts and accounts flagged to force password change on next logon.… [ Continue reading ]

Using AuthoritativeNull to overwrite an msExchMailboxGuid

While working on a unique tenant-to-tenant migration, we were going to be synchronizing a significant number of identities that had already been hybrid moved to a tenant from an on-premises Exchange organization.

Since they had existing values in msExchMailboxGuid, there was a likelihood that they might not be synchronized as just user identities–even though they were set with the msExchRecipientDisplayType of 6 (RemoteMailUser) and msExchRecipientTypeDetails of 128 (MailUser). … [ Continue reading ]

Working around accounts that expire with AAD Connect

When attempting to migrate a Microsoft 365 organization from federated authentication to Password Hash Sync, there are a couple of gotchas that can impact how you manage certain accounts.  These changes in authentication behavior determine whether you need to implement new workflows or business processes–changes surrounding expired accounts and accounts flagged to force password change on next logon.… [ Continue reading ]

Update to AADConnect Network Communications Test

It’s been a few months since I’ve updated this tool, but feedback from two individuals led me to a couple of small updates:

  • Updated the method by which domain controllers are selected for testing.  Previously, I just used the $env:LOGONSERVER variable to find the authenticating DC and didn’t actually use any of the other DCs in site (any of which AAD Connect can bind to). 
[ Continue reading ]

Update to AADConnect Network Communications Test

Today’s a bugfix day! Woo!

One of my peers, @DerrickBaxter, brought a few issues to my attention that I resolved:

  • Updated password write-back endpoints
  • Updated syntax for checking for RODCs
  • Error resolving Administrator Roles
  • Failing Azure AD Credential check functionality that logged both failure AND success

I’ve also updated a few other things, including updating the checks for DCOM/OLE permissions, trusted sites, and execution policies.… [ Continue reading ]

Update to AAD Network Communications Test

It’s literally been a year since I’ve updated it–mainly because we haven’t made any significant endpoint changes.

I did detect some CRL endpoint updates and a few other odds and ends for Worldwide Commercial and GCC Moderate, so I’ve updated the AAD Network Communications Test tool accordingly.… [ Continue reading ]

Update to AAD Network Communications Test

This week, I’ve got a few updates for the AAD Network Communications Test!

  • I’ve moved it to the PowerShell Gallery.  You can now install it with PowerShellGet by using the command:
    Install-Script -Name AADConnect-CommunicationsTest
  • I’ve updated the GCC High and DOD endpoints to the best of my ability (I’m always looking for feedback on this, so if you have new endpoints, be sure to connect with me!)
[ Continue reading ]

Cloud UPNs for AAD Connect users with Alt-ID don’t update after domain verified in tenant

A few weeks ago, I ran into an issue with a customer.  Scenario:

  • Customer had configured alternate-id sign in with AAD Connect (the gist is that it flows on-premises mail to cloud UPN)
  • Synced identity to tenant
  • Tenant did not have any verified domains

As expected, without a matching verified domain in the tenant, UPN suffixes in the tenant were actually set as @tenant.onmicrosoft.com. [ Continue reading ]