Top security considerations in an Active Directory migration
“Don’t worry,” your manager says. “Take all the time you need for that Active Directory migration.” You pause and wonder if they are feeling all right. You’ve never gotten as much time as you wanted...
View ArticleActive Directory auditing: What it entails and how to implement it effectively
Active Directory auditing is essential for one simple reason: Active Directory (AD) controls the keys to your IT kingdom. Without solid Active Directory auditing, your organization is at increased...
View Article5 Active Directory migration best practices
Active Directory delivers essential authentication and authorization services across the IT ecosystem, so it’s critical for Active Directory migrations to go smoothly. Whether your project is driven...
View ArticlePass the hash (PtH) attacks: How they work – and how to defend against them
Pass the hash (PtH) is a decades-old attack technique, but it remains a valuable tool in a cybercriminal’s arsenal to this day. Indeed, pass the hash is one of most difficult attacks to thwart. Why?...
View Article8 ways to secure your Active Directory environment
Taking the right steps to secure your Active Directory (AD) has never been more important. Because AD controls who can get into your network and what they can do once they’re inside, failure to...
View ArticleThe top activities to track when auditing Active Directory
Auditing Active Directory is vital because Active Directory (AD) controls the keys to your IT kingdom. Indeed, properly monitoring activity around Active Directory is critical across multiple...
View ArticleUnderstanding attack paths targeting Active Directory
Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your...
View ArticleAzure AD joined devices: Comparing device identities in Active Directory and...
When Microsoft designed Azure Active Directory (Azure AD), they modernized the concept of device identity by introducing new device trust types of Azure AD joined, Azure AD registered, and hybrid...
View ArticleThe anatomy of Active Directory attacks
Understanding Active Directory attacks is vital for one simple reason: Active Directory provides the essential authentication and authorization services that keep your IT ecosystem running. Any...
View ArticleHow Active Directory configurations can reduce the likelihood of intrusions
Because of the role that Active Directory plays in cybersecurity, companies are scrutinizing their Active Directory configurations to reduce the likelihood of a damaging cyber intrusion. The threat...
View ArticleHow attackers abuse Group Policy — and how to thwart them
Group Policy is an extremely powerful component of Microsoft Active Directory (AD). That makes it a vital tool for IT and cybersecurity professionals — and an increasingly common target of attackers....
View Article
More Pages to Explore .....