We know Microsoft identity and security

WHAT WE DO
Identity done intelligently
We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.
Security in safe hands
Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.
Masters at mobility
Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.
Take the agile approach
We understand that your organization is different. Our expert consultants provide a service that flexibly fits your needs.
WHAT OUR CLIENTS SAY
The breadth of expertise and the ability to execute what’s outlined in a given project timeframe is what has led me to partner with Ravenswood time and again. They have developed into my most trusted partner – always delivering on what’s promised.
Charlie Altenbach, CIO, Chuhak & Tecson, P.C.
WHAT WE DO

Fun with ADSI: Shortcuts for Binding to Active Directory Objects
Shortcuts for when you’re building scripts to work with AD or working on servers with limited access to tools.

Password Spray Attack Defense with Azure AD
Until passwordless authentication is a more viable option, we must take steps to defend against password spray attacks. Azure Active Directory can help.

Azure Active Directory Connect Installation with Granular Permissions
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege.

AD Roles: Enterprise Admins and Schema Admins
The first domain in an AD forest is unique. There are two groups in this domain that we must be aware of: Enterprise Admins and Schema Admins.

Protect Your Windows Network from the PetitPotam Exploit
The PetitPotam exploit can be used to completely own an environment, with very few prerequisites—but mitigation is within reac

Azure AD Connect Installation Strategies
If organizations don’t properly plan the synchronization solution for their cloud identities, which Microsoft calls Azure AD Connect, users will have poor experiences in the cloud. Because identity is central to security in the cloud, it’s critical to properly plan and implement Azure AD Connect.

Where to Host Active Directory FSMO Roles
The size and complexity of the organization are critical factors when determining how and where to host FSMO roles.

4 Essential Practices for Automating the Termination of Hybrid Users
When an identity from Active Directory (AD) is synchronized with a cloud-based identity platform such as Azure AD, those identities are classified as being hybrid. When user accounts are terminated in an inconsistent manner, certain aspects of the termination process may fall through the cracks, which can result in security risks for an organization.