NTLM authentication: What it is and why you should avoid using it
Discover how NTLM authentication helps determine if a user accessing an IT system is who they claim to be.

Discover how NTLM authentication helps determine if a user accessing an IT system is who they claim to be.
Discover the essentials of multifactor authentication (MFA): its definition, available technologies, and the pros and cons of each.
Learn how to implement a Zero Trust model in on-premises or hybrid Active Directory environments to dramatically strengthen security.
Learn how Active Directory Domain Services (AD DS) holds critical information in your IT environment, and tips to protect domain controllers.
Golden Ticket attacks have a playful name but are a serious threat to Active Directory environments. Learn how to defend against them.
Understand Active Directory vs. Azure AD: their similarities, differences, and collaboration capabilities.
Learn why Group Policy objects are a prime target and how hackers exploit this critical feature within your Active Directory environment.
Learn what KRBTGT is, when to update it, and how to minimize your organization’s authentication vulnerabilities.
Discover how applying a 4-step plan for managing GPOs will improve your Active Directory security strategy.
Group Policy is a critical element in any AD environment. Explore how attackers compromise it and defense strategies to protect your system.
Group Policy will be at the forefront of everyone’s mind in 2021. Learn how to harden your security by defending your GPOs.
Learn about the 6 AD security public service announcements and timeless security tips from a Microsoft Certified Master.