Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Active Directory

Articles

7 Key Risk Indicators in the Varonis Active Directory Dashboard

All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...

Read More

Active Directory Migration Tool (ADMT): Your Essential Guide

There are days where you need to move objects in a domain or forest to somewhere else, and those days require the Active Directory Migration Tool (ADMT). Hopefully, any moves...

Read More

Active Directory Domain Controller (AD DC) Could Not Be Contacted [SOLVED]

When your users report that they see “an active directory domain controller for the domain could not be contacted” there could be a few different causes for this issue. Most...

Read More

Active Directory Users and Computers (ADUC): Installation and Uses

Active Directory Users and Computers (ADUC) is a Microsoft Management Console snap-in that you use to administer Active Directory (AD). You can manage objects (users, computers), Organizational Units (OU), and...

Read More

Active Directory Domain Services (AD DS): Overview and Functions

Active Directory Domain Services (AD DS) are the core functions in Active Directory that manage users and computers and allow sysadmins to organize the data into logical hierarchies. AD DS...

Read More

Group Policy Editor Guide: How to Configure and Use

The Group Policy Editor is a Windows administration tool that allows users to configure many important settings on their computers or networks. Administrators can configure password requirements, startup programs, and...

Read More

What is an Active Directory Forest?

An Active Directory forest (AD forest) is the top most logical container in an Active Directory configuration that contains domains, users, computers, and group policies. “But wait?” you say. “I...

Read More

5 Ways to Protect Active Directory with Varonis

The fastest way to break into someone’s network is through Active Directory (AD) – it’s the key to the entire kingdom. If you need access to any server, you need...

Read More

5 FSMO Roles in Active Directory

Active Directory (AD) has been the de facto standard for enterprise domain authentication services ever since it first appeared in late 1999 (in Windows Server 2000). There have been several...

Read More

Top Azure Active Directory Tutorials

Remember a few years ago when security pros and IT admins were afraid to store business files on the cloud? Today, the circumstances are different. I recently spoke with an...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.