Active Directory

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless

In the past few years, we’ve seen a rapid expansion in remote and remote-hybrid workforces. Remote employees primarily use cloud-native services to manage their daily workloads from the comfort of their home (or public) internet. This has caused a great deal of stress for IT departments, especially those that rely heavily on their internal infrastructure.   […]

3 Components of Cloud Authentication: Enterprise SSO, Zero Trust, Passwordless Read More »

Network Time Protocol Configurations: A Deeper Dive

In my previous blog post we reviewed why time synchronization is important, as well as proper time synchronization configuration of domain controllers (DCs) holding the Primary Domain Controller Emulator (PDCe) role. We were able to properly configure Network Time Protocol (NTP) settings through the use of Windows Management Instrumentation (WMI) filters and Group Policy. Like

Network Time Protocol Configurations: A Deeper Dive Read More »

Active Directory Forest Recovery: Plan to Eliminate Downtime

Microsoft Active Directory (AD) is still the predominant identity and management platform for tens of thousands of organizations worldwide. Larger organizations with hundreds to even thousands of applications continue to rely on AD, even as they transition to a cloud-first or AD-minimized environment. The reason? Unraveling all the AD-related technology and applications an organization has

Active Directory Forest Recovery: Plan to Eliminate Downtime Read More »

Hacked and Afraid: Dramatic Tales from AD Disaster Recovery Scenarios

[WEBINAR] Hacked and Afraid: Dramatic Tales from AD Disaster Recovery Scenarios In this webinar, Brian Desmond, Principal at Ravenswood Technology Group and Brian Hymer, Solutions Architect at Quest reveal personal stories about how they suffered, triaged, survived, and recovered from Active Directory and Entra ID nightmares.  WATCH NOW [RESOURCE AUTHOR]

Hacked and Afraid: Dramatic Tales from AD Disaster Recovery Scenarios Read More »

How to Implement Microsoft Entra Password Protection for a More Secure Environment 

Passwords have long been the de facto authentication mechanism for identities. Length and complexity plagued us as we struggled to produce an acceptable password that we could easily remember and type when prompted. Although we’re moving closer to a passwordless and much more secure world, for now, we must still create these memorable, complex dinosaurs

How to Implement Microsoft Entra Password Protection for a More Secure Environment  Read More »

Recovering from an AD Security Breach or Disaster

[WEBINAR] Recovering from an AD Security Breach or Disaster In this webinar, Sean Metcalf from Trimarc and Brian Desmond from Ravenswood Technology Group discuss the best practices for quickly dealing with and recovering from AD security breaches. WATCH NOW [WEBINAR] https://www.youtube.com/watch?v=o80Tr9OwYRM In this webinar, Sean Metcalf from Trimarc and Brian Desmond from Ravenswood Technology Group

Recovering from an AD Security Breach or Disaster Read More »

Get Started With LDAP Security

You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of its customers. The company ended up not pulling the trigger, even though vulnerabilities still exist with the default implementation of LDAP. These security holes allow man-in-the-middle (MITM) attacks and replay

Get Started With LDAP Security Read More »