Active Directory Security

Retake Control of Attribute Sync to Azure AD

Retake Control of Attribute Sync to Azure AD

  • Darren Mar-Elia | VP of Products

Keeping directory sync in sync with security best practices With Azure AD Connect, synchronizing directory data from on-premises Active Directory to Azure AD is both easy and efficient. But is it possible to have too much of a good thing? Security best practices limit sharing to a strict need-to-know basis.…

Should you upgrade to Active Directory 2016…or stay where you are?

Should you upgrade to Active Directory 2016…or stay where you are?

  • Sean Deuby | Principal Technologist

Should you upgrade your existing AD forest to Windows Server 2016 Active Directory (aka AD 2016), or should you leave it where it is? Despite the focus and activity around adopting cloud services today, the fact remains that Active Directory continues to underpin it all. In addition to longstanding dominance…

Hackers go phishing

Portrait of a 21st Century Active Directory Attacker

  • Noa Arias

It’s been almost 30 years since the movie “Hackers” was released and many of us, when we think of a cyberattacker, still picture a guy wearing a hoody, hanging in his basement while hacking away at a keyboard to gain notoriety. However, a lot has changed in the past three…

Kerberos at the Company Party

Kerberos at the Company Party

  • Sean Deuby | Principal Technologist

Back in 1999, I wrote a book on Windows 2000 Server in general, and Active Directory in particular. I try not to look back at what I wrote about AD back then compared to what I know now, but I remain fond of a passage that explained how the Kerberos…

How Do I Protect Against Ransomware?

How Do I Protect Against Ransomware?

  • Joseph Carson

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. “Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target.…

Maintaining Information Security Compliance Through Active Directory Services

Maintaining Information Security Compliance Through Active Directory Services

  • Noa Arias

Now more than ever, technology and compliance teams need to work together to protect the integrity of their organizations. Sensitive information is stored and transferred in digital form and associated regulations are becoming increasingly strict and complex. While compliance is responsible for identifying the regulations which pertain to information security,…

5 Information Security Policies Every CISO Must Enforce Now

5 Information Security Policies Every CISO Must Enforce Now

  • Joseph Carson

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of…

Active Directory Auditing Guidelines: AD Security 101

Active Directory Auditing Guidelines: AD Security 101

  • Mickey Bresman

This blog addresses why Active Directory auditing is necessary. Who moved my object and other AD mysteries Active Directory was created to simplify identity services in the enterprise, and ease the lives of sys admins everywhere, but lack of visibility into AD operations continues to be a major pain point.…