Active Directory Videos

How to force a Group Policy update | How to Active Directory

Group Policies are not updated instantaneously and sometimes there would be a need to be updated instantly for various reasons. In this video, we will touch upon what Group Policies are, and then we will take a look at the default Group Policy update schedule, why you would need to force updates and methods for forcing Group Policy updates in an AD network. Check out a more detailed explanation in…
Read more
Active Directory Videos

How to create, edit, and link a Group Policy Object | How to Active Directory

In this step-by-step tutorial video, we will look at what AD Group Policy objects (GPO) are, what are its types are, and how you can implement the group policies using GPOs in Windows Server 2012 Active Directory Check out a more detailed explanation in our article here 👇 https://www.windows-active-directory.com/create-enable-disable-gpo.html For more such articles on Windows Server Management…
Read more
Webinars

A 5-Step Cybersecurity Strategy for Your Organization

About this webinar With attacks and threats on the rise, your organization needs a fool-proof security strategy. Implementing a solid cybersecurity plan that suits your organization’s needs can be challenging. To make it simpler for you, cybersecurity expert Jay Reddy of ManageEngine has conjured a quick 5-step process to secure your organization in-and-out. The webinar will also cover…
Read more
Webinars

How to combat and prevent insider threats in 2021

Watch this webinar on how to combat and prevent insider threats in 2021 Watch Now According to Forrester researchers, the remote-workforce trend will drive a steep rise in insider threats in the coming years. Currently, 25 percent of data breaches are attributed to insider threats, a figure which is expected to rise to 33 percent by 2021, according to the report. Despite the possibility of…
Read more
Webinars

Prevent Active Directory password attacks - Steps and Tools

In this webinar, you’ll: Learn about 4 cyberattacks that thrive on poor password practices .Get an anatomical analysis of each password attack.Understand best practices that’ll help thwart these attacks.Get to know how the right tools can help you implement the recommendations. Presented by Jay Reddy,IAM expert A sought-after speaker on the latest IAM and…
Read more
Recent AD News

Automate access decisions with risk-based contextual authentication

Fortifying Access Management while Working Remotely With more businesses opting for their workforce to work from home, there has been an exponential increase in remote user-focused cyberattacks. As IT teams scramble to deploy strict security measures like multi-factor authentication (MFA) to prevent any possible security event, the user experience of remote employees ends up taking a hit. A…
Read more
Webinars

What is NIST Cybersecurity Framework and how to align with its 5 core functions?

Why attend this webinar? The 2019 SANS OT/ICS Cybersecurity Survey revealed that the National Institute of Science and Technology (NIST) Cybersecurity Framework (CSF) was the most widely adopted cybersecurity framework. In this webinar, we discuss why it’s regarded as the gold standard for cybersecurity by many organizations and how you can align with its core functions and strengthen…
Read more
Active Directory Fundamentals

Active Directory Basics: Everything you need to know

What you will learn: An organization will consist of multiple employees, devices, contacts, and large amounts of data. It would need to sort all these resources and information in a structured manner for easy access, and also secure its resources. This is where directory services come into play. A directory service categorically arranges all the resources in a structured and hierarchical manner…
Read more
Active Directory Fundamentals

DNS and Active Directory

What is AD DNS? Domain Name System (DNS) is a name resolution method that is used to resolve hostnames to IP addresses. It is used on TCP/IP networks and across the internet. DNS is a namespace. Active Directory is built on DNS. DNS namespace is used internet-wide while the Active Directory namespace is used across a private network. The reason behind the choice of DNS is that it is highly…
Read more
Active Directory Policies

Group Policy Management Console (GPMC) – Part II

Inpart Iof Group Policy Management Console (GPMC), we introduced the GPMC MMC snap-in, its functionalities and also looked at how to perform a few basic tasks. In this part, we will look at some of the other tasks that can be executed from the console. Linking a GPO In the GPMC, locate the domain or OU to which the GPO is to be linked and right click.To link an existing…
Read more