Group Policy as an Attack Pathway
Learn some of the main group policy attack pathways, why they are easily exploited, and how to mitigate them in this article by Darryl Baker.
Learn some of the main group policy attack pathways, why they are easily exploited, and how to mitigate them in this article by Darryl Baker.
Although we live and work in a cloud-first world, on-premises Active Directory (AD) remains a vital component of many companies' IT infrastructure. This article goes over five ways to keep Active Directory secure.
This article is a recap of Bryan Patton's and Joe Sharmer's TEC session. This session focused on key challenges facing today’s Active Directory administrators during consolidation and divestiture projects.
Figuring Out Recovery Strategies This session was an open panel conversation between Brian Hymer, Brian Desmond, and Patrick Ancipink, three acknowledged experts with a core focus on Active Directory. The key goal of the session was to discuss Active Directory (AD) issues, especially how to recover from them. Feedback came from the panel leaders and […]
Preparation, Preparation, and More Preparation Migrations in Microsoft 365 are a complex beast. It seems every time you feel like you have captured everything, more apps or functionalities appear. Every shiny new tool Microsoft releases is another consideration for migration teams and IT departments. Planning for migrations – tenant-to-tenant or otherwise – is a mammoth […]
In the very early Windows NT Days, we had computer accounts connected to domain controllers. This provided the early building blocks of securing data and computers in company networks. Since then, our entire digital landscape has transformed. With modern networking and cloud adoption across so much of our world, it makes sense for our computer accounts to make the move from on-prem Active Directory (AD) to Azure Active Directory (AAD).
Kerberos Delegations can be confusing, but it is important to understand how delegations behave when configured across trust boundaries.
Running an Exchange hybrid server in Azure is easy; the challenge is cost - the savior is automation. This article covers how to automate your Exchange Hybrid server in Azure and significantly reduce the cost of running your hybrid server in Azure with basic start/stop solutions, progressing to maintenance scripts to ensure the server is kept up to date regularly. It also explores how the maintenance scripts can be expanded to cover scheduled reporting or other tasks.
Continuing our review of practices to protect cloud infrastructures from weaknesses that can be introduced from on-premises accounts, we consider admin rights, authentication, and conditional access policies. Plus the need to collect and analyze the log data available in cloud environments to make sure that nothing nasty is slipping through.
The reality is, remote employees and working situations are here to stay. Unfortunately, many organizations have regressed in terms of endpoint security, partly due to the pandemic as well as the subsequent rush to implement remote work solutions. To help make sense of the many technologies out there and determine the best approach for your organization, this article explores different options from the traditional Active Directory domain membership with group policy management, to co-management with Configuration Manager and Microsoft Intune.
This is the third article in a continuation of our weekly series celebrating the 10-year anniversary of Office 365. Microsoft MVP Nicolas Blank shares his experience as a Microsoft Certified Master for Exchange 2010, and how his world changed drastically over the past ten years as he followed Exchange into the Cloud.
Microsoft has issued a security advisory to Office 365 customers about a security risk with the Azure AD Connect sync service account.