active directory

Comments Off on The misuse and compromise of any Active Directory users identity

The misuse and compromise of any Active Directory users identity

The misuse and compromise of any Active Directory users identity

Earlier this month, Dark Reading reported that Active Directory mis-management by administrators is currently exposing a whopping 90% of businesses to cyber breaches. The research made by Skyport concluded that should an administrator’s password become compromised, the “blast radius will reach nearly every system in the enterprise“. It’s true — an administrator’s password that falls into the … Continued

, , Comments Off on Active Directory User Logon Logoff Security

Active Directory User Logon Logoff Security

Active Directory User Logon Logoff Security

So you want to control Active Directory (AD) user access in a more granular way than native Windows’ Group Policy? You want to add multi-factor authentication? You want to further restrict users from accessing the network based on criteria you specify? And you want to be alerted to any other suspicious logon activity – crucially before that activity becomes a serious problem? Your absolutely right. … Continued

, , Comments Off on How UserLock Guards against Shared or Stolen Windows AD Network Logins

How UserLock Guards against Shared or Stolen Windows AD Network Logins

How UserLock Guards against Shared or Stolen Windows AD Network Logins

If you ask your neighbors to watch your house and keep an eye out for any signs of forced entry when you go on holiday, you’re going to miss the burglar who steals your keys and walks right through the front door. The most worrying thing about compromised credentials is that you’re not likely to … Continued

, , , , Comments Off on Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

How to overcome those that are determined to circumvent Security? Securing User Access to the Network Today, most organizations are looking for better ways to protect their network against insider threats. For Academic Institutions, this problem is of particular importance in stopping those who are smart enough to gain entry to whatever part of the … Continued

, , , Comments Off on Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and then open access to different resources. Once a user is authenticated however, organizations need to apply … Continued