Default membership in the Pre-Windows 2000 Compatible Access group in newly deployed Active Directory domain on Windows 2025 Server

Understanding the Risks of Pre-Windows 2000 Compatible Access Settings

[Updated February 14, 2024; originally published November 29, 2021] The number and scope of confusing and risky security settings in Active Directory are becoming better known with every new cyberattack.... The post Understanding the Risks of Pre-Windows 2000 Compatible Access Settings appeared first on Semperis ... Read More

Why Recovering Active Directory from a Cyberattack Is an Essential Component of ITDR

A plan for recovering Active Directory (AD) should be a priority for your identity threat detection and response (ITDR) plan. After all, we live in a federated world of hybrid identities, zero-touch login, and distributed work. In this digital landscape, everything is connected. For most organizations, AD is at the ... Read More

Securing Hybrid Identity

Identity is the new security perimeter. Any breach in this perimeter can enable malicious users to gain access to your apps, your data, and your business operations. For organizations that rely on Azure Active Directory or a hybrid environment of Azure AD and on-prem Active Directory to provide identity services, ... Read More
Pre Windows 2000 Compatible Access properties

Understanding the Risks of Pre-Windows 2000 Compatibility Settings in Windows 2022

The number and scope of confusing and risky security settings in Active Directory are becoming better known with every new cyberattack. While it’s true that many of these vulnerabilities can be attributed to risky configurations that have accumulated in legacy environments over time, IT teams still need to watch for ... Read More
Now’s the Time to Rethink Active Directory Security

Now’s the Time to Rethink Active Directory Security

Note: This article was first published in the July 2021 issue of the monthly newsletter  Security Networking, and appears here with the permission of the publisher.      Winding back the clock 21 years to the turn of the millennium would be a strange experience, given the world we live ... Read More

How to Defend Against Active Directory Attacks That Leave No Trace

Cybercriminals are using new tactics and techniques to gain access to Active Directory in novel ways, making their attacks even more dangerous—and more necessary to detect.  One of the most important parts of any cybersecurity strategy is detection. Having an ability to spot the bad guy entering, moving about, or worse—administering—your network is ... Read More

Secure Coding Practices