November 2010

Kerberos Delegation and Troubleshooting

[ARTICLE] Kerberos Delegation and Troubleshooting When things go wrong with Active Directory’s (AD’s) Kerberos implementation, troubleshooting can be a daunting task. Ninety-nine percent of the time, everything just works—so opportunities to practice troubleshooting are limited. When you do need to solve a problem, it’s important to have a good technical understanding of the protocol. One […]

Kerberos Delegation and Troubleshooting Read More »

Active Directory: Designing, Deploying, and Running Active Directory, 4th Edition

[BOOK] Active Directory, 4th Edition To help you take full advantage of Active Directory, this fourth edition of this bestselling book by Brian Desmond from Ravenswood Technology Group gives you a thorough grounding in Microsoft’s network directory service. With Active Directory, you’ll learn how to design, manage, and maintain an AD infrastructure, whether it’s for

Active Directory: Designing, Deploying, and Running Active Directory, 4th Edition Read More »

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

[WEBINAR] How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Active Directory exploitation is the common thread in high-profile attacks, including Colonial Pipeline, SolarWinds, Hafnium. Every day we hear about a new attack, a new vulnerability, and devastating consequences. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Read More »