Microsoft Tools for Managing Privileged Accounts, Part 2

Posted by aeadmin on Feb 27, 2018 9:08:39 AM

 

In Part 1 of this post, we examined how two Microsoft solutions, Privileged Access Workstation (PAW) and Local Administrator Password Solution (LAPS), protect privileged accounts and the data and applications they use. PAW is capable of distinguishing privileged administrative accounts from normal user accounts. When a privileged account is recognized, PAW creates a hardened physical environment for sensitive tasks while preventing high-risk activity. LAPS automatically generates, encrypts and randomizes passwords based on security policies and simplifies password management.

Read More

Tags: adaptivedge, cybersecurity, PAWS, identity management, privileged accounts

Microsoft Tools for Securing and Managing Privileged Accounts, Part 1

Posted by aeadmin on Feb 9, 2018 6:32:35 AM

 

In a previous post, we discussed how to protect privileged accounts using robust identity management and authentication mechanisms to control access to company resources on a more granular level. We introduced three tools from Microsoft that can keep privileged accounts from being compromised – Microsoft Privileged Access Workstation (PAW), Local Administrator Password Solution (LAPS) and Privileged Access Management (PAM). In this post, we’ll take a deeper dive into PAW and LAPS.

Read More

Tags: adaptivedge, PAWS, LAPS, identity management, privileged accounts

Preventing Sensitive Data from Seeping through the Cracks

Posted by aeadmin on Feb 5, 2018 6:00:00 AM

 

Over the last several posts, we’ve been discussing the need for a modern security strategy that protects the “identity perimeter” with special emphasis on securing privileged accounts. We also explained how user and entity behavior analytics can break the cyberattack chain by identifying and mitigating insider threats and compromised user credentials.

Read More

Tags: adaptivedge, cybersecurity, identity management, privileged accounts, data loss prevention, identity perimeter

To Break the Cyberattack Chain, You Need the Right Tools

Posted by aeadmin on Jan 29, 2018 7:00:00 AM

 

In the military, the term “attack chain” or “kill chain” is used to describe how an attack is structured and executed, from identification of a target to selection of an appropriate weapon to the use of that weapon on the target. Reconnaissance operations are employed throughout the chain to monitor the movement and defense capabilities of the target and evaluate the impact of the attack.

Read More

Tags: adaptivedge, cybersecurity, identity, phishing, UEBA, cyberattack, security

Tools and Techniques for Protecting Privileged Accounts

Posted by aeadmin on Dec 28, 2017 1:35:06 PM


In our last post, we explained that identity has become the new perimeter in today’s cloud-based, mobile-enabled environment. It’s no longer possible to maintain IT assets and applications behind a firewall. Organizations must implement robust identity management and authentication mechanisms to ensure that only authorized users gain access to resources.

Read More

Tags: Active Directory, adaptivedge, Azure, cybersecurity, privileged accounts, Microsoft

How Azure Active Directory Premium Helps Secure the Identity Perimeter

Posted by aeadmin on Dec 15, 2017 10:00:00 AM

 

The days when users accessed corporate applications and data via desktops at the office are long past. Mobile devices enable anytime, anywhere access to both internal and cloud-based resources. The traditional network perimeter no longer exists.

Read More

Tags: Active Directory, adaptivedge, microsoft azure, cybersecurity, Microsoft, security

Yesterday’s Cybersecurity Strategy Is Ineffective Today

Posted by aeadmin on Dec 1, 2017 8:59:47 AM


Cybersecurity is a top priority for organizations. According to IDG’s 2017 State of the CIO Report, 32 percent of CEOs want their CIOs to focus on upgrading the IT security infrastructure. That’s the same number that are wanting their CIOs to help drive revenue growth. What’s more, 51 percent of survey respondents said their cybersecurity strategy and overall IT strategy were tightly integrated. On average, 12 percent of the IT budget is earmarked for cybersecurity.

Read More

Tags: adaptivedge, Azure, microsoft azure, cybersecurity

Planning your Microsoft Application Strategy in a Cloud Crazy World

Posted by aeadmin on Sep 20, 2017 10:21:20 AM


This webinar, given by our Senior Managing Partner, Steve Soper, provides a high-level overview of Microsoft Application deployment pros and cons of Cloud, On-Premise and Hybrid topologies.  The session will cover Exchange, SharePoint, Skype for Business (Lync) and Active Directory along with their cloud counterparts in Office 365 and Azure.  Learn some of the critical decision points and criteria to consider in developing your go-forward Microsoft application strategy.

Read More

Tags: Adaptive Edge, adaptivedge, Private Cloud, Cloud, microsoft gold partner, Office 365

How to Enable Office 365 Group Writeback for a Hybrid Coexistence Environment

Posted by aeadmin on Apr 30, 2017 10:15:08 AM


I would like to discuss today configuring Office 365 Groups with on-premises Exchange Hybrid. Office 365 Groups is the new type of group that allows its members to collaborate efficiently through a variety of services, such as SharePoint Team Site, Yammer, Shared OneNote Notebook, Shared Calendar, Planner, and SharePoint Document Library.

Read More

Tags: adaptivedge, Coexistence, Hybrid, O365, Office 365 Groups, SKU, Azure, Enterprise, Group Writeback, microsoft gold partner, Office 365, PowerShell, Unified Groups

Monitoring DMZ and Workgroup Systems with OMS, Part I

Posted by aeadmin on Feb 13, 2017 2:33:11 PM

Monitoring DMZ or isolated workgroup systems is one of the challenges we all face with System Center Operations Manager (SCOM). Until now, the only way to collect data and monitor these types of systems via SCOM was by installing a gateway to the management server. Anyone who has installed a gateway knows the pain I speak of.

Read More

Tags: adaptivedge, IaaS, SQL, Technology, workgroup, DMZ, IoT, microsoft gold partner, OMS, system center

    Are You Secure? Score a FREE O365 Security Assessment.

    We're here to help!

    We'd love to find out more about the projects and initiatives you're working on to exchange ideas and provide some high-level guidance where we can.  We love learning from others as well as sharing some of our experience and lessons learned.  Let's talk!

    Subscribe to Email Updates

    Recent Posts

    Posts by Tag

    see all