Understanding the cyber kill chain and how it impacts Microsoft 365
The cyber kill chain is a cybersecurity model that details the stages of a cyberattack. Learn all about it and how it impacts Microsoft 365 environments.
The cyber kill chain is a cybersecurity model that details the stages of a cyberattack. Learn all about it and how it impacts Microsoft 365 environments.
Learn real-world insights into how Active Directory configurations can help to harden your cybersecurity defenses and reduce unwanted intrusions.
Attack paths are an issue for any identity and access management system. Learn what they are and the most common ones targeting Active Directory.
Taking the right steps to secure your Active Directory has never been more critical. Learn 8 Active Directory security best practices to reduce your risk.
Every organization needs a solid ransomware recovery strategy to combat the potential devastation of ransomware attacks. Here are a few best practices to get started.
Do I need to migrate SID History from source to target environment in an AD migration? Read about pros and cons, including product risk and security risk.
Active Directory migration in a hurry? Bad idea. Migration is a perfect time to examine identity, groups, apps, data and devices. Learn how to do it right.
Kerberos authentication has been Microsoft’s default authentication method since Windows Server 2000. Learn how it works and how to maximize its security.
NTLM authentication helps determine if a user accessing an IT system is who they claim to be. Learn how it works and why it can present risks.
What is Active Directory Domain Services? Is it different from Active Directory? We explain it all and share best practices to protect domain controllers.
Golden Ticket attacks have a playful name but are a serious threat to Active Directory environments. Learn how they work and how to defend against them.
Learn what Azure AD Conditional Access is, who needs to use it and how to set it up.