Active Directory sites in a nutshell


An Active Directory (AD) environment has things like forests, trees, domains, organization units, and objects. After growing acquainted with these concepts, the next step on this learning journey is to understand AD sites.

What are AD sites?

AD sites are …

Active Directory 4 min read Read

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Have you looked into some of the most well-known Active Directory (AD) attacks from around the world? Do you understand the nuances of these popular attacks and can you put the AD fundamentals you learned in the earlier parts of …

Active Directory 5 min read Read

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework in 2013 to help organizations understand the attack pattern of threat actors. These attack patterns give us an indication of how an attacker enters a network, …

Log360 2 min read Read

A security analyst’s guide to understanding ransomware: The healthcare edition [E-book]

If you’re an IT security specialist, you’re probably familiar with the overwhelming number of cyberattacks that organizations have faced since the beginning of the pandemic. Attackers are constantly looking for ways to compromise an organization’s network, and upon gaining entry, …

Log360 2 min read Read

A practical approach to Active Directory Domain Services, Part 8: AD attacks

How and why do attackers target an organization’s Active Directory (AD)?

This blog, which is part 8 of the series A Practical approach to Active Directory Domain Services, will provide you with the answers. In this part, we will examine …

Active Directory 6 min read Read

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

Microsoft SharePoint Online is one of the most widely used content management platforms. Unfortunately, Proofpoint recently discovered that threat actors can abuse a feature in SharePoint Online and OneDrive for Business to encrypt all of your files and hold them …

RecoveryManager Plus 2 min read Read

Kerberos and Active Directory

If you have been researching Active Directory (AD), chances are that you will come across the concept of Kerberos for user authentication and other service request-related functionalities. 

It is worthwhile to examine the Kerberos protocol in depth and, in turn, …

Active Directory 5 min read Read

How to lower security risks and cyber insurance premiums

The COVID-19 pandemic has transformed the way we live and work as we continue to rely more on technology than ever before. As a consequence, ransomware attacks and data breaches make headlines practically every week. In order to avoid the …

AD360 2 min read Read

A practical approach to Active Directory Domain Services, Part 7: Cybersecurity and AD

In the first six parts of this blog series, we laid the foundation for beginning to work with and manage Active Directory (AD). With the groundwork out of the way, it is now time to explore the relationship between cybersecurity …

Active Directory 5 min read Read