Understanding Azure AD Sync: An overview of Azure AD Connect Sync and Cloud Sync
Learn about Azure AD sync, the difference between Connect and Cloud Connect sync and security factors to consider when using them in your environment.
Learn about Azure AD sync, the difference between Connect and Cloud Connect sync and security factors to consider when using them in your environment.
Learn the three misconfigurations in Active Directory that impact the security of Entra ID and how to best reduce those risks.
Learn what a DCSync attack is, why they are used and the best ways to defend against them.
Learn why the upcoming Active Directory skills shortage is more critical and prominent than in other areas of IT and steps you can take to prepare for it.
Learn what the succession plan for future Active Directory admins should look like ahead of the retirement boom of more experienced admins.
DCShadow attacks are post-exploitation attacks where privileged credentials are leveraged. Learn how they work and how to defend against them.
Learn how Kerberoasting attacks on Active Directory unfold, why attackers love them, and key ways to combat them and improve security.
The cyber kill chain is a cybersecurity model that details the stages of a cyberattack. Learn all about it and how it impacts Microsoft 365 environments.
Learn how Active Directory password policy has evolved and the key settings to be aware of.
Even if you have a working MFA implementation to your network or cloud resources, it’s time to reevaluate and see if you need to make further adjustments.
Kerberos has been the default authentication protocol in Active Directory since Windows Server 2000. Learn about the latest updates.
Learn real-world insights into how Active Directory configurations can help to harden your cybersecurity defenses and reduce unwanted intrusions.