Active Directory is Microsoft’s enterprise directory service for on-premises environments. It can be connected to Azure Active Directory to create a hybrid environment.
Latest Articles
Shared mailboxes are widely used in Exchange and their permissions are relatively simple to set and manage. In this blog, Jaap Wesselius deep dives into Understand Exchange shared mailbox permissions and walks you through how to grant permissions in different Exchange environments.
Join us for a thrilling Halloween special of the Practical 365 podcast with special guest Sean Metcalf, CTO of Trimarc. In this Episode, we'll explore the eerie changes in Windows 11 as it seeks to banish NTLM, navigate through common Active Directory misconfigurations, and delve deeper into the practical aspects of managing Active Directory configurations and so much more.
This blog is a recap of Sean Metcalfs TEC session on The Current State of Microsoft Identity Security: Common Security Issues and Misconfigurations.
We hope that you never have to perform a full AD forest recovery in production, but it is something that you’ll want to be well prepared for. Check out this blog and learn what you should be including in your AD recovery plan.
In this blog, James Yip reviews Microsoft's Entra ID Cross-Tenant Sync feature, and how it can make things a lot easier when deploying a M&A project.
In this blog, Paul Robichaux covers a recent TEC Talk where he discusses AD-Based Attacks in 2023 and what we've learned so far.
Active Directory modernization is a crucial step for organizations looking to transform and enhance their IAM capabilities. In this blog, Julian Stephan dives into an overview of some of the benefits and considerations of Active Directory modernization.
At the end of March, Practical 365 traveled with the TEC European roadshow, traveling between three cities in Europe over a week, listening to experts talking primarily about security-focused topics aimed at improving your Microsoft 365, Azure AD and Active Directory. Read our whistle-stop tour of the most important points made by expert speakers.
Because of the way the Windows security model works, it’s not currently possible to eliminate the use of passwords for local administrator accounts. Given that fact, the next best solution is to remediate the biggest problems with passwords for these local accounts, including weakness, reuse, and tenure. In this article, we discuss how the Local Administrator Password Solution (LAPS) helps with all of those!
Active Directory has been around for almost 25 years. As such, one might expect that – by now – we would have figured out to keep it safe against attacks. Yet, it remains a weak point in many organizations' cybersecurity defenses. When coupled with the challenges mentioned above, this can be a recipe for disaster. Why is this the case?
Implementing zero trust in the world is a big hassle, often uncomfortable, and frequently dorky—plus, it can be expensive. At the same time, moving closer to a zero trust model helps harden your network significantly, and you may already have many of the tools and techniques you need available without much extra cost. In this article, we discuss how to take baby steps toward Zero Trust.
A writeup about the MERCURY attack by the Microsoft Threat Intelligence team reveals how a nation state actor linked to the Iranian government compromised an Azure AD tenant by using the AADConnect tool. In this article, we discuss how the attack developed and what you can do to prevent the same attack techniques being used against your tenant.