Security

Windows 365 Boot and Switch: Building a Solid Foundation

In the ever-evolving landscape of digital workspace solutions, Windows 365 emerges as a cloud-based PC deployment solution tailored for organizations seeking enhanced security and centralized control. With the advent of Windows 365, two key features come into play: Windows 365 Boot and Windows 365 Switch. In this blog, we’ll explore what these two services offer, […]

Windows 365 Boot and Switch: Building a Solid Foundation Read More »

6 Tips to Harden Your Windows LAPS Deployment

In a previous blog post, we covered how to migrate to Windows Local Administrator Password Solution (LAPS). With Windows LAPS deployments gaining traction, it’s important to review configuration items and implement policies that can harden your endpoints and mitigate attacks from bad actors. Secret encryption, secret history, access control list (ACL) monitoring, and more play

6 Tips to Harden Your Windows LAPS Deployment Read More »

Review Your Privileged Users & Groups

[VIDEO] [VIDEO] https://www.youtube.com/watch?v=6Ntn7Y6RIuo Looking to secure your Active Directory (AD)? The best place to start is by reviewing your privileged users and groups.    In this video, AD expert Brian Desmond advises on:  How many people you should have in privileged groups  If you should include service accounts in privileged groups  What an AdminSDHolder is

Review Your Privileged Users & Groups Read More »

The State of Security with Brian Desmond

[PODCAST] The State of Security with Brian Desmond What are in-the-trenches pros observing when it comes to Active Directory and identity security in 2023?  Brian Desmond from Ravenswood Technology Group returns to the HIP Podcast to provide updates on current challenges and trends, including Active Directory hardening, PKI, and Tier 0 infrastructure protection. LISTEN NOW

The State of Security with Brian Desmond Read More »

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy

In a previous blog post, we discussed taking advantage of Entra (formerly Azure Active Directory) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. For example, in most organizations an Entra Application Proxy: Sounds

Securing On-Premises Access Is Easier Than You Think: Utilizing the Entra Application Proxy Read More »

Panel: Defending Hybrid Identity Environments Against Cyberattacks

[WEBINAR] Panel: Defending Hybrid Identity Environments Against Cyberattacks In this webinar, leading experts from the identity security space, including Brian Desmond from Ravenswood Technology Group, share their insight and experience helping real-world organizations secure hybrid environments, which are prime targets for increasingly common cyberattacks that compromise on-premises systems, then move to the cloud—or vice versa.

Panel: Defending Hybrid Identity Environments Against Cyberattacks Read More »

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless

In the past few years, we’ve seen a rapid expansion in remote and remote-hybrid workforces. Remote employees primarily use cloud-native services to manage their daily workloads from the comfort of their home (or public) internet. This has caused a great deal of stress for IT departments, especially those that rely heavily on their internal infrastructure.  

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless Read More »

Network Time Protocol Configurations: A Deeper Dive

In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the Primary Domain Controller Emulator (PDCe) role. We were able to properly configure Network Time Protocol (NTP) settings through the use of Windows Management Instrumentation (WMI) filters and Group Policy. Like

Network Time Protocol Configurations: A Deeper Dive Read More »