Retake Control of Attribute Synchronization to Azure AD

With Azure AD Connect, synchronizing directory data from on-premises Active Directory to Azure Active Directory is both easy and efficient. But while simple to configure, keeping the default settings might leave you more exposed than your security and regulation practices allow. Azure AD domain, OU, app and attribute filtering allow organizations to synchronize only a […]

Retake Control of Attribute Synchronization to Azure AD

With Azure AD Connect, synchronizing directory data from on-premises Active Directory to Azure Active Directory is both easy and efficient. But while simple to configure, keeping the default settings might leave you more exposed than your security and regulation practices allow.

Azure AD domain, OU, app and attribute filtering allow organizations to synchronize only a handful of attributes to minimize the exposure of personally identifiable information in this setup. So, why wouldn’t you use it?

AD Hidden Object Detector

Recent attacks on Active Directory show that attackers are able to exploit poorly-delegated permissions to take control over a privileged user account, hide that account, and persist in your AD environment.

Picking the right type of solution for active directory backup

The infrastructure extension to the cloud has created new challenges for AD administrators to navigate.

Directory Services Protector for Active Directory

Active Directory is an essential part of IT infrastructure for all large enterprises. AD security is vital for preventing data breaches, especially with the rise of AD-based cyberattacks.

5 Tips for Securing Active Directory from A Cyber Attack

Are you taking the right precautions to protect your company’s Active Directory?

Active Directory Disaster Recovery

Active Directory Disaster Recovery Written by Russell Smith, Petri – IT knowledgebase

Averting Disaster: Preparing Your Organization for an Active Directory Failure

Active Directory disasters put organizations at risk, with downtime leading to ceased internal and external communications, lost access to line of business applications, lost revenue and damaged brand reputation.