Microsoft introduced Active Directory Services Interface (ADSI) with Windows 2000 as the company prepared to release Active Directory. The objective of ADSI was to provide a powerful, but easy-to-use, ...
Securing Microsoft Active Directory (AD) involves dealing with a mixed bag of risks, ranging from misconfigurations to unpatched vulnerabilities. That's why many current cyber-attacks involve a breach ...
The company’s ADSecure-DC solution expands its Active Directory protection to non-Windows endpoints. About a year ago Attivo introduced an endpoint product that could detect suspicious attempts to ...
Editor’s Note: This story is reprinted from Computerworld. For more Mac coverage, visit Computerworld’s Macintosh Knowledge Center. Supporting Mac users can be a challenge to systems administrators in ...
Microsoft's free tool lets IT keep an eye on the overall health of an on-premises Active Directory environment through Office 365. Organizations that choose to adopt Office 365 very often have an ...
Hackers can use tools like BloodHound to visualize the shortest path to owning your domain. But that doesn't mean you can't use it to find and protect your organization's weak spots. Here's how.
Recently, I was working with a client that was having a number of Kerberos problems. While reviewing their environment to troubleshoot their Kerberos issues I noticed something that is called a ...
Editor’s note: When originally published this article said that by using dynamic user identification (UID) generation, users might be assigned a different UID number each time they logged onto a ...