Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Active Directory

Articles

A Guide to Group Policy and Why it Matters for Data Security

Group Policy is a feature of Microsoft Windows Active Directory that adds additional controls to user and computer accounts. Group policies provide centralized management and operating systems configurations of user’s...

Read More

Active Directory Account Lockout: Tools and Diagnosis Guide

Account lockouts are a headache for system administrators, and they happen a lot in Active Directory (AD). Research shows that account lockouts are the biggest single source of calls to...

Read More

Active Directory Resource Center

Active Directory is the foundation for a majority of enterprise networks, and cybersecurity professionals need to have a solid understanding of it to protect and secure sensitive data. Most any...

Read More

Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks

Windows Management Instrumentation (WMI) is a subsystem of PowerShell that gives admins access to powerful system monitoring tools. Though this system has been designed to allow for fast, efficient system...

Read More

How to Run an Active Directory Audit Using Varonis

Active Directory (AD) holds the keys to the kingdom, and attackers know all the tricks to take advantage of vulnerabilities in AD to stay hidden and move around the network...

Read More

Active Directory Has a Privacy Problem

Back when I was pen testing with the wonderful PowerView, I was using it to pull user information from Active Directory.  At the time I was more interested in gathering...

Read More

Azure Active Directory: Best Practices and Tutorials

Are you one of the 90% of organizations that Gartner predicts will move to hybrid cloud infrastructure by 2020? Most of that 90% will use Microsoft Azure Active Directory for...

Read More

AWS vs Azure vs Google: Cloud Services Comparison

Doing business in a cloud is more than just a lovely way to pass the time. Cloud computing services make sense from both a strategic and performance angle. However, business...

Read More

Should You Follow Microsoft’s Guidance to Stop Expiring Passwords?

You may have heard that Microsoft changed their guidance on password expiration policies. On May 23, 2019, they released a blog post explaining their decisions. As cybersecurity experts already know,...

Read More

7 Key Risk Indicators in the Varonis Active Directory Dashboard

All an attacker needs is time and motivation to infiltrate your network. It’s your job to make their efforts to break in and remain undetected as difficult as possible. First,...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.