Learn to audit for and prevent DCSync attacks in your Active Directory environment. Most other sources miss more attack paths to DCSync abuse. Find all the DCSync attack paths; if you don’t, the Attackers will.
Many Active Directory attacks’ root vulnerability is the domain’s AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
How security hardened are your servers really? Find out the free tools and methods to ensure your environment is NIST standards hardened and compliant!
Are you looking for Client System Hardening Best Practices? Find out how you can test and improve your Windows Client environment security!
Are you defending PowerShell abuse in your network? Find out the PowerShell best practices for preventing abuse.
Looking for a secure way to build Active Directory groups? Learn how to build role-based access controls using security group nesting.
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
A custom company-specific wordlist is vital to conducting password audits or blocking weak passwords from being set. Read how you can build a wordlist targeted at your company and defend against weak passwords.
How to audit and better secure Active Directory passwords. The latest updates to enterprise password policy and best practices. Tips on how you can stay up to date on breaches.
Are inactive computer objects plaguing your Active Directory database? Find out how to automatically keep AD clear of old computer objects. Maintain a clean AD database to keep AD secure.