[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[What we do]
Identity done intelligently
We literally wrote the book on Active Directory. We’ll give you full control over your identity management process.
Security in safe hands
Feeling confident your environment is safe is priceless. Our consulting team members are experts in designing secure, hardened infrastructure.
Masters at mobility
Mobility brings your team enormous productivity potential. We’ll ensure you get the benefits without the inherent risks.
We understand that your organization is different. Our expert consultants provide a service that flexibly fits your needs.
[What our clients say]
“Ravenswood’s technical expertise, exceptional responsiveness, attention to detail, and willingness to go above and beyond have made collaboration seamless and enjoyable.”
Director, IT Global Security
Confidential Chemicals Manufacturing Client
[From the blog]
Microsoft announced that after October 31, 2021, viral Azure Active Directory tenants would no longer be created for B2B collaboration.
Inactive accounts that aren’t disabled in a timely manner threaten your AD environment. Cleanup of these accounts is crucial to keeping an organization secure.
Deciding who can access data is a key part of zero-trust. With Azure AD authentication contexts and other tools, you can do exactly this.
Shortcuts for when you’re building scripts to work with AD or working on servers with limited access to tools.
Until passwordless authentication is a more viable option, we must take steps to defend against password spray attacks. Azure Active Directory can help.
Azure Active Directory Connect (AADC) installation creates a set of permissions that in most cases does not follow the concept of least privilege.
The first domain in an AD forest is unique. There are two groups in this domain that we must be aware of: Enterprise Admins and Schema Admins.
The PetitPotam exploit can be used to completely own an environment, with very few prerequisites—but mitigation is within reac