Netwrix recognized in Gartner’s 2020 Market Guide for File Analysis Software Learn More
1 May, 2019 | Brian Johnson

What Are Mousejacking Attacks, and How to Defend Against Them

If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes using a $15 USB radio device that discovers vulnerable devices. In this podcast, Brian Johnson,...
26 October, 2018 | Ryan Brooks

Active Directory Security 101, Episode 1: Listen and Learn

Active Directory is the foundation of authentication and authorization in your IT environment, so you need to know how to keep it secure. That’s why Netwrix is happy to support a 7 Minute Security podcast about the fundamentals of Active Directory security. In this episode, Brian Johnson, the...
30 August, 2018 | Jeff Melnick

Privileged Access Management in Windows Server

Many organizations struggle to secure their systems because their Active Directory is already compromised. AD is usually compromised by insiders or successful attacks on them. So how to keep environment protected even when a privileged your account got hacked? Microsoft Windows Server 2016 has...
30 November, 2017 | Russell Smith

Privileged Access Management to Secure a Compromised AD Forest

Privileged Access Management (PAM) is a new feature in Windows Server 2016 that can secure environments even in cases where AD is already compromised. In this blog, I’ll describe the architecture requirements for setting up PAM solutions. Many organizations struggle to secure their systems...
20 February, 2017 | Brian Svidergol

Securing Active Directory

IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing...
15 December, 2016 | Russell Smith

Security Tip: Detect Permission Changes in Active Directory

In this tip, I will show you how to enable auditing for changes to permissions on Active Directory objects. The following changes will log Event ID 5136 whenever someone successfully delegates or changes permissions on an object in Active Directory. The first step is to enable auditing of...
7 December, 2016 | Russell Smith

Credential Guard: One More Way to Protect Your Data

Windows Server 2016 and Windows 10 both include Credential Guard, a virtualization-assisted security solution that helps to protect sensitive Active Directory credentials from compromise. In this article, I’ll explain how Credential Guard works. It's all about Pass-the-Hash Pass-the-hash (PtH)...
26 May, 2016 | Russell Smith

Best Practices: Active Directory Security

Active Directory is large and complex, but following some basic security best practices can make it easier to keep secure. Here are five steps to making your systems more robust. FIrstly we'd like to recommend you using Active Directory tools for sysadmins to make sure that all changes and...
16 May, 2016 | Russell Smith

4 Steps to a Secure Active Directory Administration Model

Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator...
18 March, 2014 | Brian Svidergol

Securing Active Directory Administration - Part 3

We continue the series of posts about aspects of securing Active Directory administration, created by Brian Svidergol. There are three parts to this series, each one dedicated to a specific problem around securing Active Directory administration. To get a deeper insight into the topic, you are...
Show more articles