Active Directory

  • Blog
  • Active Directory
Windows Server 4 Hero Approved

Uncover Weaknesses in Active Directory Before Attackers Do

This post is sponsored by Semperis For twenty years, Active Directory (AD) has been the cornerstone of identity management. Despite the popularity of cloud computing, AD remains a key part of the infrastructure that almost every IT service relies on for its security. Active Directory is vulnerable to attack Active Directory was designed for a...

Last Update: May 10, 2024

LATEST

Semperis HIP conference

Semperis Hybrid Identity Protection Conference 2021

Last Update: May 10, 2024

The Hybrid Identity Protection (HIP) Conference is the premier educational forum for IT pros tasked with managing identity and securing hybrid cloud environments. As the global health pandemic and move to digitalization change the way enterprises work, the HIP Conference helps IT pros to learn and implement technology that mitigates new business risks. The conference…

View Article
Security

ManageEngine ADSelfService Plus: Protect On-Premises and Cloud Services from Password Attacks with Multi-factor Authentication

Last Update: Apr 17, 2024

Advanced password attacks, like brute force and those launched by malicious insiders, are devastating the security of today’s enterprises and cloud services. ADSelfService Plus from ManageEngine can protect web properties from such attacks with multi-factor authentication (MFA). Multi-factor authentication is the best way to protect Active Directory and cloud-based user accounts As the impacts of…

View Article
Semperis Purple Knight

Learn How Organizations Are Using Semperis Purple Knight to Secure Active Directory

Last Update: Apr 17, 2024

Purple Knight is a free security assessment tool for Microsoft Active Directory that scans the AD environment for indicators of exposure (IOEs) and indicators of compromise (IOCs), provides an overall security score, and offers remediation guidance from identity security experts. This article is sponsored by Semperis. Recently, Petri interviewed several organizations in North America to…

View Article
hero approved survey

Petri.com’s New Active Directory Outage and Disaster Recovery Survey

Last Update: Apr 16, 2024

Petri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,…

View Article
Security

How to Find and Block Breached Passwords in Active Directory

Last Update: Apr 16, 2024

Cybercriminals love passwords. They’re simple to guess, easy to steal, and can offer unfettered access to a goldmine of data to hold for ransom or sell to other cybercriminals. For those same reasons, compromised passwords are a constant headache for IT teams, who spend far longer than they’d like helping users reset them and fixing…

View Article
Cloud Computing

5 Reasons to Consolidate Active Directory Domains and Forests

Last Update: Apr 16, 2024

A Windows Server Active Directory (AD) forest is the topmost logical container in an AD configuration. In this article, Michael Otey explains the role forests play in an AD configuration and why it is necessary to consolidate Active Directory forests and domains to improve security and management. Every Active Directory deployment contains at least one forest, the parent container in…

View Article
Security

How to Set Up (Microsoft Entra) Azure AD Domain Services

Last Update: Apr 16, 2024

How to set up Azure Active Directory Domain Services

View Article
Storage

What is Azure AD Domain Services?

Last Update: Apr 16, 2024

Learn about Azure AD Domain Services and how does it differs from Azure Active Directory.

View Article
Security

What Is IAM? A Guide to Identity and Access Management

Last Update: Apr 08, 2024

Identity and Access Management (IAM), is a crucial cybersecurity framework that governs and secures digital access to resources. It plays a pivotal role in helping organizations control and secure their digital resources such as apps, files, user identities, permissions, and all other organizational data. IAM also helps ensure the confidentiality and integrity of sensitive information….

View Article
Go to page