By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Active Directory security News
December 15, 2015
A new blog post detailed authentication vulnerabilities in Microsoft Kerberos that cannot be patched and could lead to attackers having free rein over systems.
May 05, 2015
Microsoft has released its Local Administrator Password Solution for a common admin login account across all domain-joined computers in hopes that it will decrease pass-the-hash attacks.
July 15, 2014
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
Active Directory security Get Started
Bring yourself up to speed with our introductory content
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. Continue Reading
Are read-only domain controllers a more secure option for setting up domain services in a DMZ than using a separate domain? Expert Kevin Beaver explains. Continue Reading
Video: A Radiant Logic executive explains how virtual directory services ease the pain of integrating legacy Active Directory and identity systems with cloud-based applications and user-owned devices. Continue Reading
Evaluate Active Directory security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
DDoS amplification attacks that use the CLDAP protocol are a new threat to enterprises. Expert Matthew Pascucci explains how they work and how enterprises can protect themselves. Continue Reading
This Security School examines how security professionals should consider updating and adapting their IAM framework to work with emerging technologies. Continue Reading
Your IAM infrastructure should cut through the 'access excess' that is plaguing most companies. Learn how to overcome the challenges posed by migration to cloud and mobility. Continue Reading
Manage Active Directory security
Learn to apply best practices and optimize your operations.
Active Directory OUs maintain order in an IT organization. But if you're not careful, an errant keystroke can topple everything. Continue Reading
Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading
Many Hadoop variants offer fully integrated Kerberos, with facilities to improve setup and link to your existing identity repository. Continue Reading
Problem Solve Active Directory security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend such attacks. Continue Reading
How Aorato's Directory Services Application Firewall protects Active Directory, and why it's useful for enterprises. Continue Reading
Is IMEI authentication a secure choice when considering a mobile authenticator? Randall Gamby explains why it may not be a wise choice. Continue Reading