News

Active Directory dMSA Attack Detailed The blog post goes into great detail on the dMSA migration process, but a key point in the attack development came when the researcher was looking for a way ...
This project involved setting up and configuring an Active Directory environment to simulate enterprise-level access control and user management. A new domain, Montigny.com, was created and fully ...
If you want to store BitLocker Recovery Keys in Active Directory, configure GPO & enable BitLocker. Follow the steps mentioned here to do the same.
Formerly known as Azure Active Directory, Microsoft Entra ID is a Windows-centric IAM that’s more suited for an enterprise environment where access to various network or company assets needs to ...
The New-ADDiagram cmdlet is used to generate a Active Directory diagram. The type of diagram to generate is specified by using the DiagramType parameter. The DiagramType parameter relies on additional ...
3. Use security assessment tools To perform periodic security assessments and audits of your Active Directory infrastructure, we suggest using security assessment tools to scan for vulnerabilities in ...
8. Consolidate the management and reporting of security incidents. Install monitoring tools for Active Directory in order to centralize administration, monitoring and reporting.