Azure AD Connect Force Sync PowerShell/ Synchronization Service Manager. As a default, the synchronization cycle in Azure AD is executed every 30 minutes. However, sometimes, as an Azure administrator, you may need to make urgent changes to on-premises AD objects and want them synchronized immediately with Azure AD. For instance, forcing a sync is necessary, […]
How to Setup Active Directory on Windows Server 2022. One of the most notable features of Windows Server that helps it stand out in the Enterprise sphere is Active Directory. All in all, it is a great tool for enhancing security for organizations, enabling administrators to have a centralized user and rights management. The latest Windows […]
Get-AzureADAuditSignInLogs – Find Sign In Logs for Last 30 Days with PowerShell. Since its inception more than 10 years ago, PowerShell’s command line interface (CLI) has proven to be a vital tool for managing local and remote Windows, macOS, and Linux systems. One of its vital uses in server administration is finding the sign in […]
Domain Controller Security Best Practices – Hardening (Checklist). In 2020 Microsoft released a patch that would fix Zerologon vulnerability that affected domain controllers. The vulnerability allowed attackers to gain access into domain controllers. How? By exploiting a flaw previously found in the Netlogon Remote Protocol cryptographic scheme. In turn, this vulnerability served as a further […]
Top 15 Office 365 PowerShell Commands (Users, Groups, Licensing). As a Windows PowerShell user, I am aware that using PowerShell for Office 365 administration may seem complicated to a lot of Office 365 users. However, in my experience, Windows PowerShell is extremely useful tool for managing Office 365. Let’s learn the top 15 Office 365 […]
Active Directory Security Groups Best Practices. There are powerful tools for administrators to control which Windows servers and network resources individual users have access to. By not properly managing these groups, you may unwittingly provide cybercriminals with a backdoor to enter your network and steal sensitive information. However, it is possible to keep your systems […]
What is a Botnet Attack ? and How to Prevent Botnet Infections. The nature of cybercrime has evolved from its benign origins at the advent of the internet. Botnet attacks have evolved from the dissemination of the first polymorphic viruses all the way to today’s sophisticated botnet attacks. Often when botnet attacks occur, they are […]
Active Directory Nested Groups – (Best Practices). First of all Azure Active Directory groups are useful tools for Azure users when it comes to controlling the active directory access of various users. Often, you may need to enforce similar permissions and management practices across several groups in Azure. This is tiresome and time consuming. And […]
Setup Azure Conditional Access + Multi Factor Authentication MFA. Today’s cyberthreat environment is ever evolving. A while back, it was safe to assume that your account was safe with a password. Not anymore. Cybercrime has evolved. Hence, cybercriminals have devised new, sophisticated methods to steal passwords, render their use insufficient, and companies have taken notice. […]
Azure AD Group Types Explained – Security / Microsoft 365 Groups. Microsoft’s current iterations of Azure and Microsoft 365 are the result of years of technological development aimed at providing a seamless experience for their customers. Hence, Microsoft created the groups feature in order to give users the ability to manage resources. However, this has led to […]
- 1
- 2