* Centrify Corporation offers products to help you integrate your non-Windows devices and applications with Active Directory's management services Has your company made a serious investment in ...
Back in the day (back before there was broadband, son), telecommuting meant connecting from home to the office by dialing in over a modem to one of possibly, a bank of modems in the telecomm room at ...
A popular target of attackers, Microsoft Active Directory will receive an extra measure of protection under a new offering announced Thursday by Attivo Networks. The company’s ADSecure-DC solution ...
An improperly configured Active Directory can render the rest of your security measures useless. With so much attention being paid to factors like endpoint security and server hardening, it is easy to ...
It’s always been possible to get Linux desktops to work on Windows-based networks; I do it all the time. But it’s not a job for an average Linux user or a Windows network administrator’s whose MCSE ...
An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the ...
In an Active Directory environment, you can create a logon script that can be applied to user accounts that automatically goes to work once a user logs in. Logon scripts can be used to assign tasks ...
We continue to report issues with abnormally slow login to Active Directory services when using mobile login (i.e. logging in from outside the network hosting the Active Directory services). When ...
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names ...
When you're planning to implement an Active Directory, you should begin by selecting a root domain name. You don't have to register your domain name, but I highly recommend doing so because it allows ...
An attack using the SMB file sharing protocol that has been believed to work only within local area networks for over a decade can also be executed over the Internet, two researchers showed at the ...