Article

Kensington’s Passwordless Spotlight featuring Ravenswood Technology Group

[ARTICLE] Kensington’s Passwordless Spotlight featuring Ravenswood Technology Group Kensington partnered with Ravenswood experts in the cybersecurity community to discuss a passwordless future and showcase their biometric security products. If your organization has recently adopted passwordless with Kensington biometric security devices and would like to be featured in a future passwordless spotlight, click the link below …

Kensington’s Passwordless Spotlight featuring Ravenswood Technology Group Read More »

Three Steps to Harden Your Active Directory in Light of Recent Attacks

[ARTICLE] Three Steps to Harden Your Active Directory in Light of Recent Attacks This webinar that Brian Desmond co-hosted with Semperis (the folks behind the Purple Knight security assessment tool), focuses on a key common denominator across high-profile attacks—Active Directory. In the session “How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches,” Sean Deuby …

Three Steps to Harden Your Active Directory in Light of Recent Attacks Read More »

Active Directory Replication Topology

[ARTICLE] Active Directory Replication Topology In “Active Directory Replication In Depth,” Brian Desmond discussed the specifics of Active Directory (AD) replication technology with regard to how objects and attributes are actually kept in sync and how changes to them are tracked. A layer above this is the discussion of how AD decides which domain controllers …

Active Directory Replication Topology Read More »

Microsoft Entra ID Premium – Where to Start

[ARTICLE] Microsoft Entra ID Premium – Where to Start Microsoft Entra ID (formerly Azure Active Directory) Premium licenses unlock additional functionality for cloud identity and security capabilities. For many organizations, it is not possible to implement and manage Office 365 to the level of security necessary without Entra ID Premium. In addition to Office 365, …

Microsoft Entra ID Premium – Where to Start Read More »

Mastering Exchange Server 2010’s Exchange Control Panel

[ARTICLE] Mastering Exchange Server 2010’s Exchange Control Panel One of the new feature areas in Microsoft Exchange Server 2010 is the Exchange Control Panel. The ECP is a web-based configuration interface for Exchange that has the ability to be many things to different groups of people. For end users, when you click Options in Outlook …

Mastering Exchange Server 2010’s Exchange Control Panel Read More »

Active Directory Replication In Depth

[ARTICLE] Active Directory Replication In Depth In “Troubleshooting Active Directory Replication,” Sean Deuby presented several strategies for solving Active Directory (AD) replication problems. To troubleshoot AD replication at a deeper level, it helps to have an in-depth understanding of how replication works when changes occur in the directory. AD was one of the first LDAP …

Active Directory Replication In Depth Read More »

Delegating Privileges in Active Directory

[ARTICLE] Delegating Privileges in Active Directory One of the key benefits of Active Directory (AD) is the ability to delegate privileges on an extremely granular level to other users in the directory. With AD’s security delegation model, you can delegate common tasks—like password resets, account unlocks, or even creation and management of objects—to someone without …

Delegating Privileges in Active Directory Read More »

Sidebar: Using the Security Descriptor Editor in LDP to Remove the Abstraction from the ACL

[ARTICLE] Sidebar: Using the Security Descriptor Editor in LDP to Remove the Abstraction from the ACL You can use the Security Descriptor editor in LDP to remove the abstraction from the ACL. This interface is not very friendly or easy to use, but it will give you the opportunity to dig deeper. If you want …

Sidebar: Using the Security Descriptor Editor in LDP to Remove the Abstraction from the ACL Read More »

Kerberos Delegation and Troubleshooting

[ARTICLE] Kerberos Delegation and Troubleshooting When things go wrong with Active Directory’s (AD’s) Kerberos implementation, troubleshooting can be a daunting task. Ninety-nine percent of the time, everything just works—so opportunities to practice troubleshooting are limited. When you do need to solve a problem, it’s important to have a good technical understanding of the protocol. One …

Kerberos Delegation and Troubleshooting Read More »