Defending your organization before, during and after a cyberattack
Discover key considerations and the essential steps to take before, during, and after a cyberattack to minimize its impact.
Discover key considerations and the essential steps to take before, during, and after a cyberattack to minimize its impact.
Learn how to approach detection in identity threat, detection and response (ITDR) and tactics, techniques and procedures that apply to AD.
Learn the three misconfigurations in Active Directory that impact the security of Entra ID and how to best reduce those risks.
Learn how ITDR encompasses threat intelligence, its best practices and which tools to use for protecting identity systems.
Learn how Kerberoasting attacks on Active Directory unfold, why attackers love them, and key ways to combat them and improve security.
Password spraying, credential stuffing, brute force attacks—the similarities extend beyond their names. Learn how they work and how to prevent them.
Active Directory security groups play a critical role in controlling access to your vital systems and data. Learn how they work.
Active Directory auditing is essential because without it, organizations are at increased risk. Learn why it’s so critical and how to enable it.
Discover the essentials of multifactor authentication (MFA): its definition, available technologies, and the pros and cons of each.
Learn how to implement a Zero Trust model in on-premises or hybrid Active Directory environments to dramatically strengthen security.
Learn why Group Policy objects are a prime target and how hackers exploit this critical feature within your Active Directory environment.
Group Policy is a critical element in any AD environment. Explore how attackers compromise it and defense strategies to protect your system.