Domain Controller Security Best Practices – Hardening (Checklist). In 2020 Microsoft released a patch that would fix Zerologon vulnerability that affected domain controllers. The vulnerability allowed attackers to gain access into domain controllers. How? By exploiting a flaw previously found in the Netlogon Remote Protocol cryptographic scheme. In turn, this vulnerability served as a further […]
Top 15 Office 365 PowerShell Commands (Users, Groups, Licensing). As a Windows PowerShell user, I am aware that using PowerShell for Office 365 administration may seem complicated to a lot of Office 365 users. However, in my experience, despite of this, Windows PowerShell is an extremely useful tool for managing Office 365. For example, instead […]
Active Directory Security Groups Best Practices – Azure Active Directory Security Groups are powerful tools for administrators to control which Windows servers and network resources individual users have access to. By not properly managing these groups, you may unwittingly provide cybercriminals with a backdoor to enter your network and steal sensitive information. Azure Active Directory […]
What Are the Security Risks of Cloud Computing? Significantly, cloud computing has transformed the ever changing business landscape and how companies function today. Everything from data storage to sharing and managing workloads is being taken care of by cloud computing services. It is estimated that by 2025, over 100 zettabytes of data will be stored […]
How to Find and Export Azure AD Users with PowerShell. Beginning in June 2023, we must use the Get-MgUser cmdlet to retrieve and export Azure AD users. We import the Get-MgUser command in the Microsoft Graph SDK for PowerShell. It enables us to communicate with all Microsoft Services via a single endpoint. We store all […]
How to Check if MFA is Enabled in Office 365 for Users. With most businesses (especially enterprises) relying on heavy usage of email communication, it is obvious that sensitive data is also a part of the shared content. All in all, remote work across the globe is managed primarily through Office (Microsoft) 365 using emails, […]
What is a Botnet Attack ? and How to Prevent Botnet Infections. The nature of cybercrime has evolved from its benign origins at the advent of the internet. Botnet attacks have evolved from the dissemination of the first polymorphic viruses all the way to today’s sophisticated botnet attacks. Often when botnet attacks occur, they are […]
How to Check Active Directory Replication Status Health. Active Directory (AD) replication is an essential process that ensures data consistency across all domain controllers (DC) in an organization. If replication is not functioning correctly, it leads to various issues, including authentication failures and data inconsistencies. In this article, we discuss and test how to check […]
How to Enable Office 365 MFA (Multi-Factor Authentication) For Users. All in all, data breaches caused due to compromised security cost a hefty amount to organizations. According to a 2022 survey, over 80% of data breaches are caused due to poor password security. Securing your Microsoft accounts with passwords alone doesn’t assure data safety. Introduced […]
Find Active Directory Users with Expired Password (PowerShell). Are you responsible for managing passwords in your Active Directory (AD) environment? One crucial task is to identify users whose passwords have expired, as these users will no longer be able to log into their accounts until they reset their passwords. This article shows you how to […]