permissions-certified

The State of Active Directory Groups: Confusion, Chaos, or Control

If you’re like most IT professionals, after a group is created, you never really give that group a second thought. Once you go to the Members tab, add a user or two, and press OK, you don’t look back. It makes sense — it’s just groups, right? I mean, who cares? Perhaps the better question…

managing-groups-the-right-way

What’s the Right Way to Manage Groups in Active Directory?

In previous articles, we’ve discussed the reasons why IT often doesn’t pay attention managing groups in Active Directory (AD), as well as how security threats can arise from not doing so. In this article, we are going to review the steps required to manage groups in AD effectively and efficiently. Before we start, let’s establish…

Paying Attention

Why Don’t Groups Get the Attention They Deserve?

In the article “Are Insider Threats IT’s Fault?,” I discussed how the lack of focus on permissions granted by groups in Active Directory (AD) could be a contributing factor to insider threats and pose a potential security risk. With over one-third of organizations reporting that they do not implement any kind of least-privilege model1, this…

Insider Threat

Are Insider Threats IT’s Fault?

Asking this question might be considered edgy, so I’ll start by answering: No. Well, not exactly — not on purpose anyway. As an IT professional, you might ask yourself, “Seriously? Insider Threats are my fault?” I’m certainly not trying to alienate you. I’ve been in IT for over 20 years and know the hard work…

Active Directory Group Security: “You Don’t Even Know”

If you were to ask what’s the most difficult part of managing Active Directory groups, we’d probably get a few different answers. Probably very few of you (if any at all) would focus on the actual creation and maintenance of the groups, while most (again, if not all) would focus on the issue of where…

Time Management

Active Directory Management Wasting Your Time? If you are like millions of other people in this world, when you look at yourself and how you manage time you may come to the conclusion that you are a procrastinator, a day-dreamer, or just someone who wastes their daylight hours on tasks that are not well prioritized.…

Administrative Professional’s Paradise

Appreciation of admins through delegation of control An anecdotal story of how one company showed appreciation for secretaries and admins In honor of Administrative Professional’s Day (Secretaries Day or Admin Day), I wanted to share an experience I had while talking to one of our customer’s recently. It is after all, these very important people…

Trimming the Fat

Maintaining a Healthy Active Directory I love pizza. Pizza is often cited as the most popular food in the world. Who can blame the world for loving pizza? It has the perfect blend of things that appeal to most people. Zesty tomato based sauce, hot melted cheese, a crust that could melt in your mouth if…

Role-Based Authentication and Authorization through Attribute Evaluation

Ensure Right People with Right Access to Right Information at Right Time Defining system access for employees can be a challenging task for organizations of all sizes. But unless intimate knowledge of each employee’s role is known, granting access is often cumbersome and demands manual input from the IT department. What is needed is an…

Managing Groups in the Microsoft 365 (and Office 365) Cloud

Projecting your on-premise Active Directory groups into your M365 hosted Exchange You still need Active Directory even though you have outsourced Exchange to Microsoft via M365.  So, how do you manage it?  You want your user attributes to be accurate, group memberships up to date, unused groups expired, and security groups to be, well, secure. …