Identity and access management | July 25, 2022Active Directory sites in a nutshell An Active Directory (AD) environment has things like forests, trees, domains,...
Identity and access management | July 21, 2022A practical approach to Active Directory Domain Services, Part 9: An AD reality check Have you looked into some of the most well-known Active Directory (AD) attacks from...
Identity and access management | July 14, 2022A practical approach to Active Directory Domain Services, Part 8: AD attacks How and why do attackers target an organization's Active Directory (AD)? This blog, which...
RecoveryManager Plus | July 7, 2022A Microsoft SharePoint Online feature could be the cause of the next ransomware attack Microsoft SharePoint Online is one of the most widely used content management platforms....
Identity and access management | July 6, 2022Kerberos and Active Directory If you have been researching Active Directory (AD), chances are that you will come across...
AD360 | June 29, 2022How to lower security risks and cyber insurance premiums The COVID-19 pandemic has transformed the way we live and work as we continue to rely more...
Identity and access management | June 16, 2022A practical approach to Active Directory Domain Services, Part 7: Cybersecurity and AD In the first six parts of this blog series, we laid the foundation for beginning to work...
ADAudit Plus | June 13, 2022How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190) The recently discovered Windows zero-day vulnerability continues to make news as threat...
ADSelfService Plus | June 9, 2022How we make ADSelfService Plus more secure for you Security experts around the world are talking about the importance of improving security...
Identity and access management | May 23, 2022A practical approach to Active Directory Domain Services, Part 6: FSMO roles in AD Do new users created on one domain controller (DC) of an Active Directory (AD)...
M365 Manager Plus | May 20, 2022Cyberattacks and protecting your cloud services [E-book] 2021 saw an increase in most types of cyberattacks. The number of ransomware attacks rose...
Identity and access management | April 29, 2022A practical approach to Active Directory Domain Services, Part 4: AD groups and OUs Active Directory (AD) objects are rarely managed as standalone entities. In Part 3 of...