Are you responsible for managing Active Directory (AD) within your organization? Whether you’re an IT professional, security specialist, or part of an infrastructure team, understanding AD resiliency and best practices is crucial. Active Directory is still the most widely used Identity and Access Management (IAM) solution on the market. And for the first time in…
In this episode of First Ring Daily, Brad Sams and Paul Thurrott discuss Microsoft’s busy week with the public release of Windows 11 version 24H2 and the upcoming public preview of new AI features on Copilot+ PCs.
Last Update: Sep 30, 2024
This article will offer you a straightforward way to list Active Directory users with Active Directory Users and Computers (ADUC). I’ll show you how to do that using the graphical user interface (GUI) with the ADUC tool. Check out how to list Active Directory Users with PowerShell on Petri if you would prefer to perform…
In this article, I’ll show you how to list Active Directory users with PowerShell. While you can also list Active Directory (AD) users in Active Directory Users and Computers, PowerShell provides a much faster way. Check out how to list Active Directory Users with ADUC on Petri if you would prefer to perform this action…
Microsoft has warned that the threat actors Storm-0501 has shifted its focus to exploiting vulnerabilities in hybrid cloud environments. The company detailed in a security advisory that this group is now leveraging Entra ID credentials to target organizations. Storm 0501 was first discovered in 2021 as a ransomware-as-a-service (RaaS) affiliate for the Sabbath ransomware operation….
Last Update: Dec 18, 2024
While there are numerous paid solutions available, many IT professionals overlook the relative abundance of free Active Directory tools that can streamline management tasks. Besides making your CFO happy, these tools offer robust features that can simplify complex administrative tasks and enhance security. In this blog post, we’ll explore why IT pros should consider integrating…
Last Update: Sep 23, 2024
In this guide, we’ll show you how to install the Active Directory PowerShell module on almost any version of Windows. Installing the Active Directory (AD) module in PowerShell offers IT pros convenient and secure remote access to administer their AD environments, all without having to interactively log into their domain controllers. Microsoft does not recommend…
The Active Directory Administrative Center (ADAC) is a powerful, modern tool for managing Active Directory. Learn how to use it efficiently with our step-by-step guide and tips. What is Active Directory Administrative Center (ADAC)? The Active Directory Administrative Center (ADAC) is a tool designed for IT administrators and IT Pros to manage Active Directory. Users,…
Last Update: Sep 20, 2024
As an IT Pro in the Microsoft online landscape, you’ve certainly been seeing ‘Microsoft Entra ID‘ more often. What is this? Is there a difference between Entra ID vs Azure AD? It’s actually very simple. Read on to find out more! Entra ID vs Azure AD So, what is Microsoft Entra ID? Well, it’s very…
Last Update: Sep 20, 2024
Over ten years ago, Microsoft announced the EASE or Active Directory Enhanced Security Admin Environment. Otherwise known as your Active Directory Red Forest, it isolates your privileged access administrative accounts in Active Directory (AD). Over the last four years, Microsoft has accounted for the retirement of the ESAE in favor of a more modern privileged…
Last Update: Jan 06, 2025
Microsoft has announced the general availability of its Entra Internet Access service that launched in preview back in July. This new Internet Access solution is a Secure Web gateway (SWG) that provides secure access to all Internet and SaaS applications and is a part of Microsoft Global Secure Access. “Our solution integrates seamlessly with Microsoft…
Microsoft Entra ID has released FIDO2 provisioning APIs in public preview, allowing administrators to pre-configure security keys for employees. This update aims to simplify the onboarding process and strengthen defenses against phishing attacks. Microsoft emphasizes the need for businesses to adopt phishing-resistant methods, such as passkeys and certificate-based authentication (CBA), to safeguard users from Adversary-in-the-Middle…