[SOLUTIONS THAT MAXIMIZE INVESTMENT]
Partner with Microsoft experts you can trust
We protect, secure, and modernize your cloud, hybrid, and on-premises infrastructure, regardless of its age, complexity, or upkeep. Our internationally recognized experts provide simple, integrated solutions that maximize your investments, while responding to an ever-changing threat landscape.
[KEY SERVICE OFFERING]
A holistic health assessment for your Active Directory
The RavenswoodSM AD Health Check (ADHC) Tool is a comprehensive solution rooted in decades of practice. It assesses risk in three key areas of your AD – configuration, security, and operational procedures – and creates a snapshot of your overall health and security posture. The expertise of our team, coupled with a very detailed report about the health of your AD, will help you optimize your AD environment, increase its security, and support prioritization of items that need to be addressed.
[What we do]
[What our clients say]
[From the blog]
Are you tired of seeing the Windows Admin Center (WAC) prompt from Microsoft Windows Server Manager (as shown in Figure 1) and not knowing what to do about it? Do [...]
Passwords have long been the de facto authentication mechanism for identities. Length and complexity plagued us as we struggled to produce an acceptable password that we could easily remember and [...]
Are you ready to make the move to Entra (formerly Azure Active Directory) single sign-on (SSO)? Do you want to avoid the complications of federated authentication for Microsoft 365? Are [...]
In a previous blog series, I discussed how to use certificate authentication for PowerShell scripts running in a standard Windows environment. (See “Authentication Options for Automated Azure PowerShell Scripts, Part [...]
You may recall that in March 2020 Microsoft was planning to configure a couple of Lightweight Directory Access Protocol (LDAP) security settings on behalf of its customers. The company ended [...]
In Part 1 of this blog post, we looked at what goes into thinking about and designing your automated access policies. As discussed, we want to first think about our [...]
Many organizations control access to internal systems by simply relying on whether or not an account is enabled. However, users often change roles throughout their careers within a single organization. [...]
Web application owners need to generate and submit certificate requests to secure traffic to their websites. Application owners often use IIS to generate or renew these requests. Occasionally, the original [...]