Jan De Clercq

Jan De Clercq is a member of HP’s Technology Consulting IT Assurance Portfolio team. He focuses on cloud security, identity and access management, architecture for Microsoft-rooted IT infrastructures, and the security of Microsoft products. He's the author of Windows Server 2003 Security Infrastructures (Digital Press) and coauthor of Microsoft Windows Security Fundamentals (Digital Press) and Cloud Computing Protected: Security Assessment Handbook (Recursive Press).

Articles by Jan De Clercq
white letters Q&A on red background
Taking Ownership of a File or Folder from the Command Line
With the Takeown.exe command-line tool, administrators can take ownership of a file or folder.
white letters Q&A on red background
Enabling the Active Directory Recycle Bin
To provide longer protection for deleted objects in your Active Directory (AD) forest, you can enable the AD Recycle Bin in Windows Server 2008 R2 and later.
white letters Q&A on red background
Checking and Synchronizing Domain Controllers' Time Settings
Using the Net Time and W32tm commands, you can make sure the time settings on your domain machines and domain controllers are accurate.
white letters Q&A on red background
Performing a System State Backup from the Command Line
In Windows Server 2008 and later, you can use the Wbadmin.exe command-line utility to perform a system state backup.
white Q&A on red background
Switching to the Minimal Server Interface
In Windows Server 2012, you can easily switch from the full GUI to the Minimal Server Interface (or vice versa) using Server Manager or Windows PowerShell.
white Q&A on red background
Reducing the Attack Surface on Windows Server Platforms
Some Windows Server OSs offer installation options that provide a more secure alternative to the classic full-blown GUI-based administration interface.
Improving Security with Generation 2 Virtual Machines 1
The Generation 2 virtual machines in Windows Server 2012 Hyper-V bring important security benefits because they're based on the Unified Extensible Firmware Interface (UEFI) and they support Secure Boot.
white Q&A on red background
Reset a Computer Account's Active Directory Password from the Command Line
There are two command-line tools you can use to reset Active Directory (AD) passwords for Windows computer accounts: Windows PowerShell and Netdom.exe.
white Q&A on red background
Changing the DHCP Credentials Used for DNS Entry Updates
There are two tools you can use to change the credentials that a DHCP server uses to update a DNS server: the Microsoft Management Console (MMC) DHCP snap-in and Windows PowerShell.
white letters Q&A on red background
Viewing Expired CRLs
Here's what you need to know if you want to view expired certificate revocation lists (CRLs).
white letters Q&A on red background
Using the Certutil Utility to Check Cached CRL and OCSP Responses
With the Certutil utility, you can view and manipulate certificate revocation list (CRL) and Online Certificate Status Protocol (OCSP) responses that are cached on a system's hard disk.
white letters Q&A on red background
Ways to Check the Revocation Status of Certificates
You can use certificate revocation lists (CRLs) or the Online Certificate Status Protocol (OCSP) to provide revocation information. Here's how these two approaches differ.
white letters Q&A on red background
Understanding the Caching Mechanisms Used During Certificate Validation
Although certificate revocation lists (CRLs) and the Online Certificate Status Protocol (OCSP) differ in the way they provide revocation information, the caching mechanisms used are very similar.
White letters Q&A on red background
Disabling the RC4 Cipher
By editing the registry, you can completely disable the RC4 cipher on Windows platforms.
red background with white letters Q&A
Requiring Smart Cards for Interactive Logons
Find out what happens when you select the "Smart Card is required for interactive logon" option in Active Directory.
NEW: Microsoft Hyper-V Master Class with John Savill

A new Master Class with John Savill! Get 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment.

During this training attendees will learn how to:

-- Architect a Hyper-V based virtualization solution.
-- Migrate from physical and other virtualization environments.
-- Implement a private cloud solution.

Thursdays, April 17th through May 8th
 

Upcoming Training

Deploying Windows 7 and Windows 8.1 with System Center Configuration Manager 2012 R2

Tuesday, May 6th @ 11am, 1pm, 3pm ET

In a single day you will learn to deploy Windows 7 and Windows 8.1 using System Center Configuration Manager 2012 R2 and MDT 2013. Johan Arwidmark guides you through the entire build process. You will learn about reference images, deployment of images, drivers injection, adding updates and applications and a great deal of real-world tips and tricks.

Enroll by April 29th and SAVE 15%
View All Online Training

IT/Dev Connections

Register now to get the best rates available!

Current Issue

April 2014 - The architectural components related to Hyper-V networking in System Center Virtual Machine Manager 2012 R2 can be confusing. Walk through all the VMM networking architectural components and how to use them.

CURRENT ISSUE / ARCHIVE / SUBSCRIBE

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×