One of the best ways to secure your systems is to make sure that Active Directory (AD) domain..
It has been a long time coming. And we have known since 2017 that Adobe was planning to..
Following the Solorigate attack in late 2020, which used SolarWinds' IT monitoring and management solution Orion, Microsoft has..
One of the challenges of running a sprawling enterprise ecosystem is keeping everything consistent. With on-premises, hybrid, cloud,..
We’re doing a twice-monthly interview show on Petri.com that is dedicated to covering topics of interest to..
Creating new Active Directory users isn't difficult, either with the GUI tools or PowerShell. But in large directories,..
Creating new Active Directory (AD) users with PowerShell is easy using the New-ADUser cmdlet. But there are a..
This post is sponsored by Semperis For twenty years, Active Directory (AD) has been the cornerstone of identity..
One of the biggest security issues that organizations face with Windows Server Active Directory is the proliferation of..
Changes to the Active Directory (AD) schema can result in operational problems. In general, the schema shouldn't change...
DCShadow is a feature in the lsadump module of Mimikatz. Mimikatz is an open-source post-exploitation tool used in..
Active Directory has been in use on corporate IT networks for decades and has been a key directory..
Kerberos unconstrained delegation was introduced in Windows Server 2000. It was designed to let webservers, receiving authentication requests..
Last month, Microsoft announced Active Directory authentication for Azure Files, which is now in preview. Azure Files lets..
Windows Server Active Directory (AD) uses the Lightweight Directory Access Protocol (LDAP) to communicate between the directory service,..