Blog

Network Security

Active Directory Backup vs Replication (And Why You Need to Be Clear on the Difference Now)

Backup and replication are common data protection concepts, but they serve different purposes. Learn more about their differences and how they can benefit your data management strategy, especially how the backup vs replication argument relates to Active Directory (AD) and protecting it. What are backup and replication? Although backup and replication are both methods of…

View Article

How to Create and Link a Group Policy Object in Active Directory

Last Update: Apr 27, 2023

Russell Smith shows us how to create and link a Group Policy Object in Active Directory in this step-by-step how-to article.

View Article
Network Security

Managing Group Policy Objects: Create GPOs, Link GPOs, and Edit GPOs

If you’re an IT pro working with Active Directory, you can use Group Policy to configure the Windows environments of your users’ computers and your enterprise servers using Group Policy Objects (GPO). However, the struggle to reach an intuitive and secure environment is real. In this article, I will explain how to create a GPO,…

View Article

How to Use Starter Group Policy Objects in Windows Server

Russell Smith shows us how to create, load and save starter Group Policy Objects (GPOs) in Active Directory.

View Article
Storage

Top 5 Features to Look for in On-Premises Veeam Storage

Last Update: Apr 08, 2024

In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…

View Article
Datacenter networking servers

What Is an Access Control List (ACL)?

An access control list (ACL) is a fundamental component of computer security. ACLs help to control and manage access permissions to organizational resources. In this article, I will explain in detail what an access control list is and how you can use them to secure access to local and networked resources. ACLs are an integral part…

View Article
Cloud Computing

5 Reasons to Consolidate Active Directory Domains and Forests

Last Update: Apr 16, 2024

A Windows Server Active Directory (AD) forest is the topmost logical container in an AD configuration. In this article, Michael Otey explains the role forests play in an AD configuration and why it is necessary to consolidate Active Directory forests and domains to improve security and management. Every Active Directory deployment contains at least one forest, the parent container in…

View Article
Network Security

Top 10 Events to Audit in Active Directory to Uncover Security Risks

Last Update: Feb 15, 2024

Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

View Article
Security

How to Minimize Your Active Directory Attack Surface

Last Update: Apr 17, 2024

When newly installed, Active Directory’s (AD) default configuration is designed to be easy to use. As a result, attackers can exploit AD to take over your entire network with relative ease. Here’s what you can do to further protect your organization by reducing your Active Directory attack surface. This article is sponsored by Semperis. Securing…

View Article

Most Useful PowerShell Cmdlets for Managing and Securing Active Directory

Last Update: Jul 18, 2022

How to manage and secure Active Directory using PowerShell; I’ll look at the most useful PowerShell cmdlets and give examples of how to use them.

View Article
Go to page