AD Security
How to block remote network access for local user accounts in Windows
Introduction Local user accounts accessing other computers in the Active Directory (AD) network remotely may cause huge problems due to the security risk associated with the access privilege. The most commonly cited example is that if multiple user ...
LAPS - Manage Local Administrator Passwords on Domain Computers
What is Local Administrator Password Solution (LAPS)? The Local Administrator Password Solution, generally abbreviated as LAPS, is a tool developed by Microsoft to manage local administrator passwords on Windows computers. Since the local ...
How to Create a Group Policy to Disable USB Port for all Users except Local Administrators
How to Create a Group Policy to Disable USB Port for all Users except Local Administrators It is thus considered a safe practice to restrict USB access to all users except the administrators. This can be done with the help of Active Directory Group ...
Tracking Username and IP Address in Active Directory
Tracking Username and IP Address in Active Directory In a secure environment such as an organization, the resources being accessed by users must be tracked by the administrators from time to time. This helps in maintaining the security of an ...
Track Down Active Directory Attack Attempts
A large number of failed logon attempts within a short span of time usually indicates a security threat. This is why, it is essential for administrators to keep an eye out for such events and get to the root of the source of the failed logons. This ...
Three Best Practices for Securing Active Directory
Active Directory Security: Three Recommended Best Practices Active Directory places a central role in authorizing user access and applications. Hence it is no surprise that organizations, world over depend on it for day-to-day IT operations such as ...
Active Directory Security Baseline: Explained
Every business organization is different from one another. They serve their customers differently, their end users behave differently, and ultimately, the way that the organization handles cyber threat is vastly different from one another. Healthcare ...