Month: February 2017
It’s All about Cybersecurity: Insider Threat Missed by the Fed
Recently, while reading the news I found one interesting and, in my opinion, funny case about employee-privileged abuse. Long story short, Nicholas Berthaume, a former communications analyst of the board of governors of the Federal Reserve System has installed unauthorized software on a Fed server to mine bitcoins and was caught doing this. There are … Continued
Pro Tip: How to Copy Files from One Server to Another
Copying files from one server to another is a fairly frequent task that system administrators face. As with most things in IT, there are many ways to accomplish this task. The method you choose will depend on your situation and your personal preferences. The information below assumes that both of your servers are on the … Continued
Introduction to Active Directory Services Technologies
IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. In this part of … Continued
Active Directory Replication
IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. In this part of … Continued
Dynamic Host Configuration Protocol (DHCP)
IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. DHCP is another network … Continued
DNS in Active Directory
IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. What is Active Directory … Continued
Active Directory Database
IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. Inside the AD Database … Continued
Force a Group Policy Update with GPUpdate/Force
Imagine that you get a phone call from the security specialist who handles your firewalls and proxy servers. He tells you that he has added an additional proxy server for users going to the internet. You add a new GPO that affects all users so they can use the new proxy server via Internet Explorer. … Continued
Understanding Group Policy & Group Policy Objects (GPOs)
What is Group Policy, and what is a GPO (Group Policy Object)? Group Policy is a feature of Windows that enables centralized configuration and management of operating systems, computer settings and user settings. Each policy, or Group Policy object (GPO), defines a set of Group Policy settings. You have literally thousands of settings available when creating … Continued
Trusts in Active Directory
IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. What is Trust in AD? … Continued
3 Ways to Secure Service Accounts in Active Directory
If you’re looking for security weak spots in your organization, auditing service accounts isn’t a bad place to start. Active Directory audit should include establishing the rights assigned to each account, the password strength, the last time it was reset, and whether it is a domain account, local account, Managed Service Account (MSA), or Group Managed … Continued
4 Things You Should Never Store in Your Database
Databases are mainly used to support various business-critical applications. They can store many kinds of data. However, there are some things you should never keep in a database. These basic database security techniques will help protect your data: Unsecured Credentials This is probably an obvious point, but it’s not a good idea to store plain … Continued
Using AD to Add an Alias to an Office 365 Email Account
If you are using Office 365 with Azure AD Connect (or the older DirSync) you know that some changes to accounts cannot be made via the O365 admin portal. For instance, if someone gets married and changes their name, you may wish to add a new email address for them. Handpicked related content: Free Download: … Continued