Petri.com was recently asked by Cayosoft to conduct a survey amongst our audience regarding Active Directory (AD) downtime and disaster recovery strategies. Petri.com’s extensive experience in the marketplace, coupled with our standing as a representative voice for IT Professionals, allows us to bring distinct insights into prevailing trends and their evolution over time. The survey,...
Last Update: Mar 01, 2024
In this article, we’ll examine some of the main challenges of today’s backup and disaster recovery procedures. Then, we’ll dive into the top five most important features to look for in an on-premises Veeam storage solution for your backups. Data protection is one of the most critical tasks for IT administrators, and there is no…
Last Update: Feb 20, 2024
Ransomware protection is one the most important topics for IT Pros and C-Level technology executives. Learn how immutable backups and immutable storage help to protect your organization against data corruption and loss, malware, viruses, and ransomware – and how to implement them. This post is sponsored by Object First Veeam 2023 Ransomware trends report – most ransomware targets backups In May…
Last Update: Feb 16, 2024
When newly installed, Active Directory’s (AD) default configuration is designed to be easy to use. As a result, attackers can exploit AD to take over your entire network with relative ease. Here’s what you can do to further protect your organization by reducing your Active Directory attack surface. Securing beyond the default settings to reduce…
Last Update: Feb 15, 2024
A Windows Server Active Directory (AD) forest is the topmost logical container in an AD configuration. In this article, Michael Otey explains the role forests play in an AD configuration and why it is necessary to consolidate Active Directory forests and domains to improve security and management. Every Active Directory deployment contains at least one forest, the parent container in…
Last Update: Feb 15, 2024
Audit your Active Directory environment to ensure the security of your company’s most valuable assets. Here are the top 10 events to audit in Active Directory to identify risks. Why audit Active Directory? Active Directory provides authentication, account management, and authorization services that are critical for strong access governance. To quickly detect insider threats, organizations should audit the creation of new accounts and security groups, and…
In this article, you’ll learn some strategies to upgrade to Windows 11. Including learning about the planning and readiness phase. At times, I feel like the lion in Narnia – Aslan – being lectured and roaring back: Do Not Cite The Deep Magic To Me… I Was There When It Was Written. But I was…
As usual, we are looking forward to our annual Microsoft Teams free 1-day virtual conference, this year coming up November 30. In addition to the customary sessions presented by industry professionals and Microsoft MVPs on everything from managing users in the Admin Center to driving collaboration with proper governance, Petri’s Chief Technology Officer, Stephen Rose,…
Last Update: Nov 10, 2023
One of the main reasons that application governance is often overlooked, as it relates to an organization’s cloud security posture, is because the topic is not fully understood. . However, it is vitally important to understand the fundamentals of Microsoft Entra ID (formerly Azure Active Directory) – tenants, app registrations, enterprise apps, and consent –…
Last Update: Nov 09, 2023
Microsoft Entra ID, formerly Azure Active Directory (AD), is Microsoft’s cloud-native identity management platform. It only takes one compromised Entra ID user account to consent to a rogue app that siphons all the user’s Microsoft 365 data or to take over their mailbox. Business Email Compromise (BEC) amounts to $8 million in losses on a…