Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Active Directory

Tutorial: Learn the Basics of Active Directory

Active Directory (AD) is the cornerstone of any on-premises or hybrid Microsoft environment. It stores information about users, computers and other objects, and provides vital services that enable employees to be productive and business processes to run. This article covers the Active Directory basics you need to know.

Guide to Group Policy Management in Active Directory

Group Policy is a feature of Microsoft Windows operating systems that helps administrators manage and secure users and computers in Active Directory environments. Group Policy settings are grouped into Group Policy objects (GPOs) and applied to computer and user objects within the scope of the GPO. For example, Group Policy objects can be used to manage: This guide explains the key elements of Group Policy management.

Kerberos Ticket and Authentication in Active Directory

Many ask, what is Kerberos? Kerberos is an authentication protocol. It is designed for client-server applications and requires mutual verification. It is the default protocol used for logging into a Windows machine that is part of a domain, relies on a secure communication channel between the client and the Domain Controller (DC). Windows updates address security concerns such as vulnerabilities in this channel, ensuring that the user database stored on the DC is protected.

The IT Hour | Disconnecting AD 03.22.24

Rodger Bright, Senior Sales Engineer at JumpCloud joins us to talk about disconnecting Active Directory. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

Tips and Best Practices to Secure Active Directory: Audit and Privileged Access Management

Active Directory (AD) is a useful service that helps organizations manage identities and control access to network resources, thus improving corporate cybersecurity. However, when poorly managed, AD can be exploited in a way that could harm an organization’s sensitive assets and operational resilience. In this article, we briefly define what Active Directory is, list its main services, and discuss possible threats.

Create Bulk Users in Active Directory with PowerShell & AD Tools

Organizations today are highly dynamic, with employees, contractors, and other users constantly joining. Accordingly, IT administrators often need to create user objects in Active Directory (AD) or Entra ID (formerly Azure AD). While manually creating a single user is easy, repeating that process for multiple users is tedious and time-consuming. Moreover, it is highly prone to errors that can put security and productivity at risk.

5 Steps to Auditing Administrator Access Rights

Accounts with administrative and elevated privileges are necessary for both business and IT functions, but they represent a significant risk to your organization. In the hands of a careless or malcontent insider or an adversary, privileged credentials open the door to data breaches, infrastructure outages and compliance violations.

How LDAP is used in Active Directory

The primary protocol employed within Microsoft’s Active Directory(AD) is Lightweight Directory Access Protocol (LDAP). While LDAP serves as a fundamental component in AD, its application extends beyond, enabling user authentication in various tools and client environments. This includes Red Hat Directory Servers on UNIX systems and OpenLDAP, an open-source application used on Windows platforms.

How to Modernize Your AD Instance

Whether you want to extend your Active Directory instance to support additional capabilities, need to prepare for an eventual migration without replacing your current implementation, or are ready to move away from AD completely, we've built a roadmap for you. Find your path to modernizing Active Directory by following along with the journeys of Tyrone, Kate, and Eric, fictional IT professionals navigating three different real-world situations where AD needs an update. Grab your copy for detailed insights on the different ways you can prepare your organization to modernize AD.