DCShadow attacks: What they are and how to defend against them
DCShadow attacks are post-exploitation attacks where privileged credentials are leveraged. Learn how they work and how to defend against them.
DCShadow attacks are post-exploitation attacks where privileged credentials are leveraged. Learn how they work and how to defend against them.
Learn how Kerberoasting attacks on Active Directory unfold, why attackers love them, and key ways to combat them and improve security.
Learn what is a cyber kill chain, and how can it help you enhance your organization’s cybersecurity posture.
Discover how the Active Directory password policy has evolved and the key settings to consider and be aware of.
Learn the importance of reviewing your MFA implementation and identify potential opportunities for improvement.
Kerberos has been the default authentication protocol in Active Directory since Windows Server 2000. Learn about the latest updates.
Learn real-world insights into how Active Directory configurations can help to harden your cybersecurity defenses and reduce intrusions.
Learn about Azure AD join and how to compare device identities for Azure AD, on-premises Active Directory and hybrid AD environments.
Learn about attack paths, including the most common ones targeting Active Directory, and discover measures to protect your organization.
Learn why auditing Active Directory is vital to security and business continuity, and what types of activity to track.
Secure your Active Directory against potential risks with these 8 best practices and ensure robust security measures for your system.
Active Directory forest is a critical — but often underappreciated — element of the IT infrastructure. Learn what it is and how to manage it.