AD Roles: Enterprise Admins and Schema Admins

Active Directory (AD) is used for authentication and authorization across a…


Protect Your Windows Network from the PetitPotam Exploit

PetitPotam is a recently discovered exploit that allows an attacker to relay…


4 Essential Practices for Automating the Termination of Hybrid Users

Identity and Access Management (IAM) solutions are critical in today’s world…


Components of a PKI, Part 5: Hardware Security Modules

Preface: Components of a PKI Public key infrastructure (PKI) is a core…


Components of a PKI, Part 4: Active Directory Certificate Services

Preface: Components of a PKI Public key infrastructure (PKI) is a core…


Components of a PKI, Part 3: Certificate Revocation

Preface: Components of a PKI Public key infrastructure (PKI) is a core…


Components of a PKI, Part 2: Certificate Authorities and CA Hierarchies

Preface: Components of a PKI Public key infrastructure (PKI) is a core…


Components of a PKI, Part 1: Digital Certificates

Preface: Components of a PKI Public key infrastructure (PKI) is a core…


Azure Protection

4 Best Practices for Hybrid Identity Attributes in Active Directory

User attributes are important metadata that should…


Multi-Factor Authentication

Microsoft Information Protection, Part 2: Planning Sensitivity Label Deployment

Planning for a Microsoft Information Protection (MIP) deployment can seem…