Active Directory

LATEST

Datacenter networking servers

Active Directory Replication: A Guide for IT Pros

Last Update: Mar 13, 2024

Learn all there is to know about how Active Directory (AD) replication works. This guide covers the basics of how domain controllers (DCs) replicate all of your user accounts, passwords, computers, and other objects in your environment. Learn about how sites define the logical layout of your network and how the tools and features in…

View Article
Datacenter networking servers

What is Active Directory: The Ultimate Guide

Last Update: Mar 13, 2024

Active Directory is Microsoft’s on-premises identity and access management (IAM) service. In this article, learn how Active Directory (AD) makes it easier for IT to manage an organization’s IT resources. Active Directory is especially useful for companies that have to manage lots of endpoints and servers. What is Active Directory and why is it used?…

View Article
Network Security

Active Directory Backup vs Replication (And Why You Need to Be Clear on the Difference Now)

Backup and replication are common data protection concepts, but they serve different purposes. Learn more about their differences and how they can benefit your data management strategy, especially how the backup vs replication argument relates to Active Directory (AD) and protecting it. What are backup and replication? Although backup and replication are both methods of…

View Article
Network Security

Top 10 Events to Audit in Active Directory to Uncover Security Risks

Last Update: Feb 15, 2024

Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

View Article
Storage

Consolidating Multiple Windows Domains

Last Update: Feb 14, 2024

If you’re considering bringing Windows Server 2008 onto your network, then one of the decisions that you will eventually have to make is how you plan to integrate this new operating system into your network.  In the vast majority of cases, Windows Server 2008 domain controllers are simply added to existing domains, or some of…

View Article
Security hero image

What is Azure AD B2B?

Discover the benefits of using Azure AD B2B in your organization. Learn how it can improve collaboration and streamline access for external partners, and boost your users’ productivity, safely and securely. What is Azure B2B? Microsoft Entra B2B (formerly Azure AD B2B) is a feature/service within the Microsoft Entra ID that allows collaboration between your…

View Article
Security hero image

Azure Active Directory Flavors

Last Update: Feb 07, 2024

Sjoukje Zaal gives an overview of the different flavors of Azure Active Directory.

View Article
Datacenter networking servers

Best Practices for Installing Active Directory Domain Controllers in a Virtual Machine

Last Update: Feb 01, 2024

Installing Active Directory domain controllers in a virtual machine (VM) can be useful if you want to separate them from the physical network, giving you more flexibility and additional protection for your Active Directory infrastructure. In this guide, we’re going to detail the best practices for installing Active Directory domain controllers (DCs) in a virtual…

View Article
Cloud Computing

How to Audit LDAP Signing in an Active Directory Domain

Last Update: Jan 30, 2024

Microsoft is planning to make changes to LDAP security settings in Windows Server. In today’s Ask the Admin, I show you how to audit for unsigned LDAP traffic hitting Windows Server Active Directory.

View Article
Security hero image

Active Directory Security – 5 Steps to Secure AD

Last Update: Jan 30, 2024

In this guide about Active Directory security, we’re going to detail five steps that IT admins need to follow to secure Active Directory environments in an organization. There are many best practices you’ll need to be familiar with to ensure Active Directory security, including restricting the use of privileged accounts, monitoring Windows Event Log for…

View Article
Go to page