Active Directory

Security

The Role of Identity Threat and Detection Response in Zero Trust Security

I recently spoke to Sean Deuby, who is Principal Technologist at Semperis and an Identity expert. Sean told me about the importance of protecting identities in the current landscape and how Identity Threat Detection and Response (ITDR) is a critical component of the Zero Trust security model. The emergence of cloud computing and the shift...

Last Update: May 10, 2024

About Active Directory

Welcome to the Active Directory category page, your comprehensive guide to mastering the world of identity management in Windows Server. Active Directory (AD) is a Microsoft technology used for managing identities and computer resources securely. Here, you will find resources ranging from the basic concepts to advanced implementations. Discover how to manage user accounts, groups, and access controls; configure Group Policy; and deploy domain controllers (DC). Whether you’re a systems administrator, an IT professional, or an enthusiastic learner, this page is your gateway to understanding and leveraging AD efficiently.

LATEST

Windows Server 4 Hero Approved

Uncover Weaknesses in Active Directory Before Attackers Do

Last Update: May 10, 2024

This post is sponsored by Semperis For twenty years, Active Directory (AD) has been the cornerstone of identity management. Despite the popularity of cloud computing, AD remains a key part of the infrastructure that almost every IT service relies on for its security. Active Directory is vulnerable to attack Active Directory was designed for a…

View Article
Network Security

Top 10 Events to Audit in Active Directory to Uncover Security Risks

Last Update: May 10, 2024

Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…

View Article
warning-cyber-attack

Cybercriminals Exploit OpenMetadata Flaws to Target Kubernetes Clusters

Microsoft has recently unveiled critical vulnerabilities within OpenMetadata’s open-source metadata repository. The security flaws could allow cybercriminals to execute remote code attacks on unpatched Kubernetes clusters. OpenMetadata is an open-source platform that offers a centralized metadata management solution for data lakes, pipelines, and warehouses. It enables businesses to discover, understand, and govern their data assets…

View Article
Microsoft Loop

Microsoft Loop Adds New Filtering Capabilities to Tables and Boards

Microsoft has released a new update for its Loop app that should make it easier for users to find and access relevant information. Microsoft Loop users can now apply filters to the content in Loop Tables and Boards. Microsoft first announced its Loop app in November 2021. The new productivity app, which is built on…

View Article
Security

ManageEngine ADSelfService Plus: Protect On-Premises and Cloud Services from Password Attacks with Multi-factor Authentication

Last Update: Apr 17, 2024

Advanced password attacks, like brute force and those launched by malicious insiders, are devastating the security of today’s enterprises and cloud services. ADSelfService Plus from ManageEngine can protect web properties from such attacks with multi-factor authentication (MFA). Multi-factor authentication is the best way to protect Active Directory and cloud-based user accounts As the impacts of…

View Article
Semperis Purple Knight

Learn How Organizations Are Using Semperis Purple Knight to Secure Active Directory

Last Update: Apr 17, 2024

Purple Knight is a free security assessment tool for Microsoft Active Directory that scans the AD environment for indicators of exposure (IOEs) and indicators of compromise (IOCs), provides an overall security score, and offers remediation guidance from identity security experts. This article is sponsored by Semperis. Recently, Petri interviewed several organizations in North America to…

View Article
Security

How to Minimize Your Active Directory Attack Surface

Last Update: Apr 17, 2024

When newly installed, Active Directory’s (AD) default configuration is designed to be easy to use. As a result, attackers can exploit AD to take over your entire network with relative ease. Here’s what you can do to further protect your organization by reducing your Active Directory attack surface. This article is sponsored by Semperis. Securing…

View Article
hero approved survey

Petri.com’s New Active Directory Outage and Disaster Recovery Survey

Last Update: Apr 16, 2024

Petri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,…

View Article
Security

How to Find and Block Breached Passwords in Active Directory

Last Update: Apr 16, 2024

Cybercriminals love passwords. They’re simple to guess, easy to steal, and can offer unfettered access to a goldmine of data to hold for ransom or sell to other cybercriminals. For those same reasons, compromised passwords are a constant headache for IT teams, who spend far longer than they’d like helping users reset them and fixing…

View Article
Go to page