Author Archive for: Zubair
About Zubair
This author has yet to write their bio.
Meanwhile lets just say that we are proud Zubair contributed a whooping 11 entries.
Entries by
Comprehensive Guide to Azure Active Directory Backup and Recovery
September 23, 2024 in Uncategorized /by ZubairIn today’s interconnected world, businesses are heavily dependent on their IT infrastructure for seamless operation and data security. One crucial component of this infrastructure is Azure Active Directory (Azure AD), which manages identities, access, and authentication for cloud-based and on-premise applications. However, like any system, Azure AD is not immune to errors, data loss, or […]
How to Set Up and Manage Microsoft Active Directory Change Alerts via Auditing events
September 18, 2024 in Uncategorized /by ZubairMicrosoft Active Directory (AD) is one of the most critical controls involved in controlling users, computers, and other more resources in a Windows environment. Maintaining security and ensuring things keep running at peak operational efficiency requires monitoring any changes to your AD configuration. One of the primary means of ensuring you are aware of changes […]
How hackers exploit Group Policy Objects (‘GPOs’) to attack your Active Directory
May 27, 2024 in Uncategorized /by ZubairHackers have quickly realized that the easiest and most optimal way to spread ransomware across “all” corporate networks is to find and use compromised GPOs. When you also consider that GPOs are contained within Active Directory, which is itself the number #1 ransomware and lateral movement environment (think about it – AD doesn’t provide visibility, […]
Unveiling the Tactics: How Hackers Exploit Compromised Passwords, and How to protect
May 15, 2024 in Cyber Security, Uncategorized /by ZubairThere are dozens, if not hundreds, of possible causes behind leaked passwords. Sometimes they’re the result of a simple mistake. Other times they’re the result of an intricate scheme. We’ll look at a few of the most common causes below. Weak passwords, password reuse and multiple accounts using the same passwords One of the most common […]