The Night a DNS Admin Became a Domain Admin It was 11 PM on a Tuesday when the SIEM flagged a credential harvesting alert on a domain controller. Someone had…
A Missed Event Log Cost a Client Their Domain Admin Last year, a mid-size logistics company we manage came to us after discovering that a domain admin account had been…
While scripting a bulk user migration for a client last quarter, I hit one of those issues that wastes an hour before you realize what happened. Half the Get-ADUser calls…
The Change Nobody Documented Three service accounts disabled in production. No change ticket. No record of who did it or when. The helpdesk was fielding calls for forty minutes before…
Why Group Policy Backup Should Be Non-Negotiable in Your Change Management Process After inheriting a manufacturing client’s Active Directory environment from another vendor last year, the first thing we discovered…
In March 2023, Cl0p operators compromised a regional financial services company and reached their domain controllers in 87 minutes. The initial vector was a spearphishing email. From there, the attack…
Related reading: GitHub Discussions: Community Engagement for IT Teams | IT Auditing in the Age of AI, IoT, and Zero Trust | Citrix NetScaler: Complete Admin Guide for IT Teams…
Managing Active Directory objects is the core administrative task for any Windows domain environment. AD objects – including users, computers, groups, and contacts – form the foundation of identity and…
Cybersecurity naming conventions are standardized rules for labeling digital assets – including user accounts, firewall rules, log files, and security policies. Organizations that adopt consistent naming standards reduce misconfiguration risk,…