Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netwrix

Group Scope in Active Directory

IT pros are well aware that Active Directory has two types of groups: security groups, which are used to assign permissions to shared resources, and distribution groups, which are used to create email distribution lists. But not everyone understands that each of these Active Directory groups has a scope — and understanding how scope works is vital to security and business continuity. This blog post dives into what group scope is and exactly why it’s important.

Securing Your Group Managed Service Accounts

Abusing a gMSA is relatively simple conceptually. First, get its password using a tool like Mimikatz or by querying it directly due to insecure configurations in Active Directory. Since gMSAs are service accounts, they’re usually relatively privileged, so you’ll usually be able to move laterally or escalate. Let’s walk through an example scenario.

How to Configure Internet Explorer Settings and Open IE11 inside Edge through Group Policy

In this video, we explore a useful feature of Netwrix PolicyPak — the ability to configure Internet Explorer settings to dynamically set Internet Explorer Enterprise and Document modes. We also explain how to open an Internet Explorer tab inside Microsoft Edge.

Configure Group Policy Settings to Deploy Real GP using SCCM or Other Management Systems

Do you have endpoints that you'd love to manage using real Group Policy, but want to deploy the settings using something else? This video explains how to deliver Group Policy settings with Netwrix PolicyPak, including how to deploy templates, preferences and security settings to your endpoints using SCCM, KACE, Altiris or another desktop management system.

WDigest Clear-Text Passwords: Stealing More than a Hash

Digest Authentication is a challenge/response protocol that was primarily used in Windows Server 2003 for LDAP and web-based authentication. It utilizes Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges to authenticate. At a high level, a client requests access to something, the authenticating server challenges the client, and the client responds to the challenge by encrypting its response with a key derived from the password.