In this slideshow, Azaleos identifies tips focusing on Active Directory improvements. They have collected the following best practices from their network operations centers for making Active Directory ...
Scenario:<P>Home network, Win2K server with Active Directory<BR>ICS on another computer on the network (not the server)<P>How do I set this up so the dialup connection on one of the Win2K Pro machines ...
Once again it’s time to look back and see what we were talking about 10 years ago. And what we were talking about was the most highly anticipated launch in IdM history — Microsoft’s Active Directory.
Many small and medium-sized businesses standardize on Microsoft Active Directory (AD) for user authentication and management. That works really well when all the servers and client computers are ...
I’ve found the AD/DNS relationship to be one of the least understood aspects of Active Directory, and the literature is full of misinformation and half-truths. I was surprised to realize that in this ...
Federated identity management, or FIM, is just one of the latest networking buzzwords to hit mainstream. FIM involves a set of agreements for trusting repositories of accounts located in two or more ...
Resetting a password doesn't always remove attackers from Active Directory. Specops Software explains how cached credentials and Kerberos tickets can keep attackers authenticated after a reset. Hybrid ...
First and foremost is Sean Metcalf’s Active Directory Security blog. If you are lucky enough to catch his talks in person, you will find that they are full of tips and explanations of how attacks ...