Search results: active directory

AD report

Stale Accounts in Active Directory

What are Stale Accounts in Active Directory? Accounts that have not been used in the past six months and are no longer necessary. Stale accounts are often inactive user accounts. They are ...

Findings on Exposed Passwords in Active Directory

Password security and exposed passwords in Active Directory still matter because weak and compromised passwords lead to data breaches. The post Findings on Exposed Passwords in Active Directory appeared first on Enzoic ...

New Strata Cookbook and Identity Orchestration Recipes Automate Microsoft Active Directory Modernization and Coexistence with Microsoft Entra ID

Maverics platform enables organizations to move applications from AD to cloud-based Entra ID and extend Entra ID to on-prem apps without any code changes or browser plug-in agents BOULDER, Colo., March 21, ...

5 Tips for Securing Your Active Directory

Active Directory (AD) is Microsoft’s directory server. Ubiquitous across Fortune 500 and small businesses alike, AD is the software that connects on-prem servers, workstations, users, and networks. AD’s cloud-based counterpart, Azure, completes ...
Active Directory Credential Theft

Attacking Active Directory: Why Cyber Threats Target AD

[Updated February 21, 2024; originally published December 14, 2017] Active Directory is the most critical identity system for most enterprises. The problem is that in the two-plus decades since Active... The post ...

Streamlining certificate management: The case for eliminating Microsoft Active Directory Certificate Services

|
Enhance security and productivity with automated certificate management. Move beyond Microsoft AD CS for streamlined processes ...

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after. The post Don’t Forget About Credential Security in Active ...

Top Active Directory Hardening Strategies

The most recent Microsoft Digital Defense Report notes that nearly half of all Microsoft Incident Response engagements encountered insecure Active Directory configurations. Mandiant has previously reported that 9 of 10... The post ...

MFA for Active Directory: An Overview

Modern information security is built on a layered defense. Each layer supports the others and presents additional obstacles to threat actors. From patch management to perimeter firewalls, each layer makes... The post ...

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 3)

Welcome to the final installment of this series discussing CISA and NSA top ten cybersecurity misconfigurations in the context of hybrid Active Directory environments. Active Directory is the identity system... The post ...