How to Install & Use Active Directory Users and Computers

When it comes to dealing with Active Directory Domain Services, and it is crucial for network and directory administrator to: Understand directory services in depth Manage objects like users, computers, and groups efficiently Microsoft has provided many tools to manage Active Directory Domain Services; these tools are also available for client Windows operating systems and…

Active Directory Automation Tools

Active Directory allows administrators to manage assets across networks. No matter how big or small your organization is, managing objects, authentication, and authorization across the networks can be a daunting, time-consuming task. Active Directory helps by keeping tabs on the network objects, access to resources, and permissions. However, even with Active Directory in place, these…

Active Directory Health

When you think of Active Directory health, the first thing that comes to mind is that the directory should be organized and running smoothly. Stable directory health revolves around certain indicators, such as: The groups are up to date Only the users currently engaged with the company exist as active users No unwanted objects exist…

An Active Directory Domain Controller Could Not Be Contacted

Table Of Contents General Error description Basic steps to investigate the issue Verify that the IP Settings are Correct Make sure the DNS Client Service is Running Check the Host File for Domain Entries Restart DNS Cache Service Verify that the DC is Reachable from the Client Verify the Domain Controller’s Accessibility using PowerShell Append…

Authenticating senders with zero trust security for distribution groups

Zero Trust Security in Active Directory and Azure AD Groups

What is Zero Trust Security? Zero Trust is a security model that is built on the hypothesis that threats exist both inside and outside your network, and therefore, aims to eliminate the concept of trust from an organization’s network architecture. Its implementation centers on strict access controls (without trusting anyone by default), which translates into…

Ransomware Attacks on Active Directory

Active Directory has become a popular pathway for ransomware attacks. Take a deep dive into the exploitation tactics for proactively implementing preventive measures and disrupting threat activity. Active Directory (AD) is an on-prem identity management product that holds a plethora of identity-related information. About 90 percent of Fortune 1000 companies use Active Directory as a…

Anonymous Hacker

5 Reasons Why Cyberattackers Love AD Groups

Current research regarding cyberattacks shows that hackers target Groups in Active Directory, Azure AD and Office 365. Why are groups so attacker-friendly? The CrowdStrike 2019 Global Threat Report discusses how long it takes for attackers that have compromised a single endpoint to move laterally within your network. The Russians have the best average time at a little…

Active Directory Group Management

Is Just In Time Too Much Time?

There has been a lot of talk over the past few years on Just In Time provisioning. That is, using an SSO (Single Sign On) platform to create nearly real-time accounts in web-based applications the first time they are used. This increases productivity and reduces the amount of work required for IT workers to create…

group access identity

The Role of Roles in Delegating Access

The delegation of directory administration to those outside of IT is a concept whose time has come. But it can’t be done hap-hazardly; IT needs to define what is being delegated and to whom. We’re at a point in the evolution of our industry that two truths have come to fruition: IT no longer has…

When One Plus One is Greater than Two: Active Directory Automation

Max Wertheimer, the founder of the Gestalt Theory, once stated in a borrowed and commonly referenced Aristotle philosophy that “the whole is greater than the sum of its parts”. This means that when one thing is grouped with multiple properties, it becomes stronger and can provide more value than it could alone. This concept directly…