[RESOURCES]
Explore the latest practical advice to boost your organization’s security
[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
How to Configure Remote Credential Guard & Its BenefitsVideoHow to Configure Remote Credential Guard & Its Benefits
-
-
Protecting Privileged Access with Just-in-Time Elevation and Privileged Access WorkstationsWebinarProtecting Privileged Access with Just-in-Time Elevation and Privileged Access Workstations
-
-
TEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery PlanWebinarTEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery Plan
-
Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDKArticleUsing GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK
-
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
[FROM THE BLOG]
Update Since Posting On November 12, 2024 Microsoft released an official fix to ESC15. Additional information can be found in the Microsoft Security Response Center. Background Although many organizations rely [...]
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their careers within a single organization. [...]
Active Directory (AD) is a cornerstone of IT infrastructure for many organizations, providing essential services for managing and securing resources. This guide will take you through the essentials of Active [...]
A red forest is designed to increase the security of Windows Server Active Directory Domain Services (AD DS) by protecting privileged credentials from compromise. Privileged identities, such as members of [...]
Since the introduction of passwords as the standard for computer authentication, there haven’t been many changes beyond enforcing password length and character complexity requirements and the introduction of two-factor authentication [...]
Active Directory (AD) is a hierarchical directory service that enables you to manage users, groups, access control, and policy administration. AD is used to secure network resources, user accounts, and [...]
Microsoft Entra ID is a critical component of modern identity and access management. It acts as a front door to your applications and data by providing secure and auditable identity [...]
In today’s digital age, the complexity and connectivity of organizational ecosystems expose them to a myriad of security threats, with insider risks standing out as particularly worrisome. Recent trends indicate [...]