Microsoft Tools for Managing Privileged Accounts, Part 2

Posted by aeadmin on Feb 27, 2018 9:08:39 AM

 

In Part 1 of this post, we examined how two Microsoft solutions, Privileged Access Workstation (PAW) and Local Administrator Password Solution (LAPS), protect privileged accounts and the data and applications they use. PAW is capable of distinguishing privileged administrative accounts from normal user accounts. When a privileged account is recognized, PAW creates a hardened physical environment for sensitive tasks while preventing high-risk activity. LAPS automatically generates, encrypts and randomizes passwords based on security policies and simplifies password management.

Read More

Tags: adaptivedge, cybersecurity, PAWS, identity management, privileged accounts

Microsoft Tools for Securing and Managing Privileged Accounts, Part 1

Posted by aeadmin on Feb 9, 2018 6:32:35 AM

 

In a previous post, we discussed how to protect privileged accounts using robust identity management and authentication mechanisms to control access to company resources on a more granular level. We introduced three tools from Microsoft that can keep privileged accounts from being compromised – Microsoft Privileged Access Workstation (PAW), Local Administrator Password Solution (LAPS) and Privileged Access Management (PAM). In this post, we’ll take a deeper dive into PAW and LAPS.

Read More

Tags: adaptivedge, PAWS, LAPS, identity management, privileged accounts

Preventing Sensitive Data from Seeping through the Cracks

Posted by aeadmin on Feb 5, 2018 6:00:00 AM

 

Over the last several posts, we’ve been discussing the need for a modern security strategy that protects the “identity perimeter” with special emphasis on securing privileged accounts. We also explained how user and entity behavior analytics can break the cyberattack chain by identifying and mitigating insider threats and compromised user credentials.

Read More

Tags: adaptivedge, cybersecurity, identity management, privileged accounts, data loss prevention, identity perimeter

Tools and Techniques for Protecting Privileged Accounts

Posted by aeadmin on Dec 28, 2017 1:35:06 PM


In our last post, we explained that identity has become the new perimeter in today’s cloud-based, mobile-enabled environment. It’s no longer possible to maintain IT assets and applications behind a firewall. Organizations must implement robust identity management and authentication mechanisms to ensure that only authorized users gain access to resources.

Read More

Tags: Active Directory, adaptivedge, Azure, cybersecurity, privileged accounts, Microsoft

    Are You Secure? Score a FREE O365 Security Assessment.

    We're here to help!

    We'd love to find out more about the projects and initiatives you're working on to exchange ideas and provide some high-level guidance where we can.  We love learning from others as well as sharing some of our experience and lessons learned.  Let's talk!

    Subscribe to Email Updates

    Recent Posts

    Posts by Tag

    see all