Active Directory Replication: A Guide for IT Pros

Learn all there is to know about how Active Directory (AD) replication works. This guide covers the basics of how domain controllers (DCs) replicate all of your user accounts, passwords, computers, and other objects in your environment. Learn about how sites define the logical layout of your network and how the tools and features in […] Continue reading Active Directory Replication: A Guide for IT Pros

What is a Domain Controller?

Domain controllers (DCs) are at the heart of Active Directory Domain Services (AD DS), the directory service that provides authentication, authorization, and password management for Microsoft Windows networks. Find out here why they’re so important and what they do. What does a domain controller do? A domain controller (DC) is a server on your network that manages access for users, computers, servers, etc. centrally. It uses […] Continue reading What is a Domain Controller?

Microsoft Advises Customers to Patch Active Directory Privilege Escalation Vulnerability

Last month, Microsoft released the November Patch Tuesday updates to address two Active Directory (AD) Domain Services privilege escalation security flaws affecting all supported versions of Windows Server. But it looks like some customers have not updated their servers yet. The company published a blog post yesterday advising customers to install the emergency fixes on […] Continue reading Microsoft Advises Customers to Patch Active Directory Privilege Escalation Vulnerability

Identifying the method which an attacker used to harvest important account credentials, while the security logs are deleted

Is there a way to spot the method which an attacker used to do all of the necessary credential dumping, or stealing/forging tickets/using pass-the-hash/ticket techniques, if we don’t have access to the DC security log files, but only from … Continue reading Identifying the method which an attacker used to harvest important account credentials, while the security logs are deleted

Can a ransomware attack succeed with no root privileges, but instead if it does have privileged user access?

If an attacker succeeds in getting the password of an IT support privileged account (that has Domain Control rights), can he successfully carry out the attack and do the lateral movement needed between the Domain Controllers and/or users?
Continue reading Can a ransomware attack succeed with no root privileges, but instead if it does have privileged user access?

What are the security risks when doing domain migration of users and computers?

We are moving users and computers/servers from an old domain to a new one within our company. The domains are managed using Active Directory.
What are the security risks, considerations, and controls I need to consider to allow a secure mi… Continue reading What are the security risks when doing domain migration of users and computers?