Active Directory

Active Directory Replication In Depth

[ARTICLE] Active Directory Replication In Depth In this article for ITProToday, Brain Desmond from Ravenswood Technology Group  helps you gain a deeper understanding of exactly how AD replication works. Learn More [ARTICLE] In this article for ITProToday, Brain Desmond from Ravenswood Technology Group  helps you gain a deeper understanding of exactly how AD replication works.

Active Directory Replication In Depth Read More »

Active Directory: Designing, Deploying, and Running Active Directory, 5th Edition

[BOOK] Active Directory, 5th Edition Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book by Brian Desmond from Ravenswood Technology Group gives you a thorough grounding in Microsoft’s network directory service by explaining concepts in an easy-to-understand,

Active Directory: Designing, Deploying, and Running Active Directory, 5th Edition Read More »

Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More

[PODCAST] Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More What should you tackle first in locking down Active Directory from cyberattacks? In this podcast, Sean Deuby from Semperis and Brian Desmond from Ravenswood Technology Group share tips for five actions you can take now to significantly improve your security posture: Implement good

Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More Read More »

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

[WEBINAR] The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks You know that cyber-attacks are coming. Maybe you’ve already been hit. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. But did you know that there are some relatively simple actions you

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks Read More »

Active Directory: Designing, Deploying, and Running Active Directory, 4th Edition

[BOOK] Active Directory, 4th Edition To help you take full advantage of Active Directory, this fourth edition of this bestselling book by Brian Desmond from Ravenswood Technology Group gives you a thorough grounding in Microsoft’s network directory service. With Active Directory, you’ll learn how to design, manage, and maintain an AD infrastructure, whether it’s for

Active Directory: Designing, Deploying, and Running Active Directory, 4th Edition Read More »

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

[WEBINAR] How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Active Directory exploitation is the common thread in high-profile attacks, including Colonial Pipeline, SolarWinds, Hafnium. Every day we hear about a new attack, a new vulnerability, and devastating consequences. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Read More »