Active Directory Policies

Block windows app installation with elevated privileges using GPO

In an enterprise IT environment, controlling the permissions and actions of the Windows Installer is crucial for maintaining security and consistency. Allowing the Windows Installer to use elevated permissions during program installations can lead to unexpected changes and…
Active Directory Policies

GPO to prevent regular users from changing MSI installation options

In a managed IT environment, ensuring the consistency and security of software installations is essential. Allowing regular users to change installation options during the installation of an MSI package can lead to configuration discrepancies and potential security risks. In…
Active Directory Policies

GPO to prevent autoplay on non-volume devices

Autoplay is a feature in Windows that automatically executes a predefined action when a new device, such as a USB drive, camera, or phone, is connected to the system. While convenient, it can pose a security risk, particularly in an enterprise environment, as it can lead to…
Active Directory Policies

Prevent remote logon for local accounts with blank password - GPO

In the realm of network security, one critical aspect is ensuring that all accounts, especially those with remote logon capabilities, are secured with strong passwords. Allowing remote logon for local accounts with blank passwords can pose a significant security risk. This…
Active Directory Policies

How to deny anonymous enumeration of SAM accounts using GPO

For system administrators, safeguarding sensitive account information within the Windows environment is crucial. One important aspect of this is preventing the anonymous enumeration of Security Account Manager (SAM) accounts. Unauthorized enumeration of SAM accounts can be a…
Active Directory Policies

Restrict anonymous access to Shares and Named pipes via GPO

In networked environments, especially in enterprise settings, securing communication channels and shared resources is crucial for maintaining data integrity and privacy. A critical aspect of this security is to prevent anonymous enumeration of Named Pipes and Shares, which…

Recent Posts

Active Directory FundamentalsAzure AD FundamentalsRecent Posts

Before migrating to Active Directory Domain Services (AD DS) 2022

In today’s dynamic IT landscape, the need for organizations to be agile and adaptable is more pronounced than ever. Active Directory Domain Services (AD DS) stands as the cornerstone of organizational identity. While the allure…
Active Directory FundamentalsRecent Posts

How to change the IP address of a domain controller

The domain controller (DC) is an integral part of your IT infrastructure. Due to its role within the domain, it’s crucial that any change to its IP is done correctly. The DC’s address is statically assigned to the…
Active Directory FundamentalsRecent Posts

What is Active Directory?

Large organizations depend on Windows Active Directory (AD) to maintain order in the chaos that is managing users, computers, permissions, and file servers. Thesheer number of articles available on the internet can disconcert…
Active Directory FundamentalsRecent Posts

Security Account Manager (SAM)

What istheSecurity Account Manager (SAM)? When you log in to your Windows Operating System, you must enter a password to gain access to the system. Have you ever wondered where your passwords are stored when you set up…
Recent Posts

Active Directory Sites

What you will learn: Active Directory (AD) is a powerful and versatile directory service that allows for quite a bit of customization according to an organization’s needs. Part of the reason that makes AD a powerful tool is…
Active Directory ObjectsRecent Posts

Managing Active Directory Local Users and Groups

Local User Management deals with creating, managing, and securing user and group accounts that are stored locally on a Windows computer. Local user accounts are specific to a computer. Local Users and Groups is a part of the collection…
Promo
×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.