Security

Use Privileged Access Workstations to Mitigate Security Threats in Your Active Directory

The workstation an administrator uses to perform privileged tasks such as managing Active Directory (AD) is a high-value target for a potential adversary. By providing administrators with a clean keyboard, PAWs isolate privileged accounts from the risks of a compromised workstation.

Use Privileged Access Workstations to Mitigate Security Threats in Your Active Directory Read More »

Securing Privileged Access On-Premises and in the Cloud

[PRESENTATION] Securing Privileged Access On-Premises and in the Cloud Privileged identities are foundational to how your organization runs, and even more importantly, they secure your infrastructure. If your privileged identities are compromised or unprotected, chances are you are in for a bad day (or year). Fortunately, there are strategies to protect these identities that make

Securing Privileged Access On-Premises and in the Cloud Read More »

Microsoft Intune Compliance Notifications

We’re frequently asked how to enable compliance notifications for devices enrolled in Microsoft Intune. Although this task isn’t difficult, there are numerous ways to easily misconfigure it. The basic requirements are straightforward. You’ll need an Entra (formerly Azure AD) tenant with users that are licensed for Intune (either directly or as part of another license

Microsoft Intune Compliance Notifications Read More »

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

[WEBINAR] The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks You know that cyber-attacks are coming. Maybe you’ve already been hit. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. But did you know that there are some relatively simple actions you

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks Read More »

Sidebar: Using the Security Descriptor Editor in LDP to Remove the Abstraction from the ACL

[ARTICLE] Sidebar: Using the Security Descriptor Editor in LDP to Remove the Abstraction from the ACL In this article for ITPro Today, Brian Desmond from Ravenswood Technology Group gives 4 steps to follow when using the Security Descriptor editor in LDP to remove the abstraction from the ACL. Learn More [ARTICLE] In this article for

Sidebar: Using the Security Descriptor Editor in LDP to Remove the Abstraction from the ACL Read More »