Search

Semperis Offers New Protection Against Okta Breaches

…gaps? You can download Purple Knight 4.0 here. Remember to review the latest Purple Knight quick start document for important…
Blog

AD Security 101: GPO Logon Script Security

…mitigation using Purple Knight Figure 1 shows the results of a Purple Knight scan that found several issues in GPO…
Blog

AD Security 101: Lock Down Risky User Rights

…1 shows a Purple Knight report indicating the assignment of a dangerous GPO-granted user right. Figure 1. Purple Knight report…
Blog

Power up Azure AD Security Assessments

Want to use the free Purple Knight tool to evaluate your Azure AD security posture? To run Purple Knight in…
Blog

How to Defend Against Ransomware-as-a-Service Groups That Attack Active Directory

…about Purple Knight and request free access at purpleknight.com. For more analysis of how recent high-profile attacks have exploited Active…
Blog

Applying the MITRE ATT&CK Framework to Your Active Directory

…direct conflict with real-world data generated by hundreds of Semperis Purple Knight assessments of AD. The average Purple Knight security…
Blog

Revisiting the Colonial Pipeline Cyberattack, One Year Later

…The Stakes Are Higher in Healthcare: Fighting Cybercrime During a Pandemic Critical Infrastructure Purple Knight Report Purple Knight assessment tool…
Blog

5 Essential ITDR Steps CISOs Must Know

…be difficult or expensive. Powerful tools like Purple Knight, which helps you spot gaps and vulnerabilities that often have existed…
Blog

How Can K-12 Schools Defend Against Ransomware?

…gaps. Purple Knight also identifies incidents of compromise (IOCs)—signs that attackers might already have breached the AD infrastructure. DOWNLOAD PURPLE
Blog

NSA Top Ten Cybersecurity Misconfigurations: An Active Directory Perspective (Part 2)

…(IOCs) in Semperis Directory Services Protector and the free Purple Knight community tool that can alert you to the vulnerability…
Blog