[RESOURCES]
Explore the latest practical advice to boost your organization’s security

[Must Read]
SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY
[EXPLORE RESOURCES]
-
How to Configure Remote Credential Guard & Its BenefitsVideoHow to Configure Remote Credential Guard & Its Benefits
-
How to Sync Time in Active DirectoryVideoHow to Sync Time in Active Directory
-
Protecting Privileged Access with Just-in-Time Elevation and Privileged Access WorkstationsWebinarProtecting Privileged Access with Just-in-Time Elevation and Privileged Access Workstations
-
Active Directory Health CheckVideoActive Directory Health Check
-
TEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery PlanWebinarTEC Talk: What Should and Should Not Be in Your Active Directory Disaster Recovery Plan
-
Using GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDKArticleUsing GitHub Copilot to Upgrade PowerShell Scripts to the Microsoft Graph PowerShell SDK
-
Review Your Privileged Users & GroupsVideoReview Your Privileged Users & Groups
-
AD Recovery is Hard: What Should Your Plan Include?ArticleAD Recovery is Hard: What Should Your Plan Include?
[FROM THE BLOG]
Today, we’ll explore the signs of a pass-the-hash (PtH) attack and discuss methods to detect and prevent such attacks in your environment. At Ravenswood Technology Group, LLC, we have decades [...]
There are many components of Microsoft Active Directory Domain Services (AD DS) that can be assessed as part of a health check. Which ones to start with is, of course, [...]
By now, you’ve likely heard about Microsoft’s mandate requiring multifactor authentication (MFA) for all accounts accessing Microsoft Entra portals and APIs. If you haven’t already started, it’s time to address [...]
PowerShell plays a significant role as an administrative scripting language. It is used extensively to manage Active Directory, Microsoft Azure, and Windows Server among many things as well as a [...]
Although organizations have made strides in the security of their on-premises Active Directory environments, password harvesting methods such as the Kerberoasting attack or AS-REP roasting remain prevalent in cyberattacks. Unfortunately, [...]
When it comes to designing and administering active directory (AD), sometimes less is more. I have worked with a variety of both large and small AD environments where years of [...]
The last major Active Directory Domain Services (AD DS) update came with the release of Windows Server 2016. While there was a schema update with Windows Server 2019, it was [...]
Microsoft Active Directory (AD) serves many purposes. The most important role it provides is authentication. To make authentication painless, Windows (and non-Windows) systems use AD to authenticate user accounts and [...]