Lightweight Directory Access Protocol (LDAP) decoded for beginners

If you are a beginner on your Active Directory (AD) learning journey, then you must have stumbled upon the term LDAP. It’s quite possible that...

Active Directory 3 min read Read

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of this series on Active Directory Domain Services.  In...

Active Directory 4 min read Read

Active Directory sites in a nutshell

An Active Directory (AD) environment has things like forests, trees, domains, organization units, and objects. After growing acquainted with these concepts, the next step on...

Active Directory 4 min read Read

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Have you looked into some of the most well-known Active Directory (AD) attacks from around the world? Do you understand the nuances of these popular...

Active Directory 5 min read Read

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework in 2013 to help organizations understand the attack pattern of threat actors....

Log360 2 min read Read

A security analyst’s guide to understanding ransomware: The healthcare edition [E-book]

If you’re an IT security specialist, you’re probably familiar with the overwhelming number of cyberattacks that organizations have faced since the beginning of the pandemic....

Log360 2 min read Read

A practical approach to Active Directory Domain Services, Part 8: AD attacks

How and why do attackers target an organization’s Active Directory (AD)? This blog, which is part 8 of the series A Practical approach to Active...

Active Directory 6 min read Read

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

Microsoft SharePoint Online is one of the most widely used content management platforms. Unfortunately, Proofpoint recently discovered that threat actors can abuse a feature in SharePoint...

RecoveryManager Plus 2 min read Read

Kerberos and Active Directory

If you have been researching Active Directory (AD), chances are that you will come across the concept of Kerberos for user authentication and other service request-related functionalities. ...

Active Directory 5 min read Read