AD360 | November 11, 2024Active Directory security: Exploiting certificate services Active Directory (AD) is crucial for an organization's identity and access management...
General | February 13, 2023Monitoring domain user accounts with elevated access rights Standard users having elevated privileges is never good news. Accounts such as domain...
AD360 | October 28, 2021Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book] Ransomware attacks continue to rattle organizations across the globe. Especially worrisome...
Log360 | February 18, 2021Dangerous defaults that put your IT environment at risk: IT security under attack In this blog in the “IT security under attack” series, we wanted to shed some light on an...
Log360 | October 15, 2020Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds A critical Active Directory vulnerability (CVE-2020-1472) has been making headlines for...
ADManager Plus | November 11, 2019Cleaning up inactive user accounts in Active Directory When employees leave organizations, their user accounts often remain in Active Directory ...
General | August 22, 2019There's more than one way to get admin privileges Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a...
ADSelfService Plus | October 2, 2018Strengthen your first line of defense against hackers Passwords are the first line of defense between a hacker and your data. A decade ago, a...
General | June 1, 2017Stay on top of your security game with our free workshops With the recent bout of security attacks stemming from leaked NSA vulnerabilities,...
ADManager Plus | June 5, 2014How to Find Active Directory Accounts with Expiring Passwords Every organization has one or more user accounts — used for services, applications,...