Authentication, Access Control & Encryption

Last Updated on 1 Oct. 2014, Total: 184 Articles and Tutorials

  1. Back to Basics: Groups vs. Organizational Units in Active Directory

    This article takes a look at the differences between an Active Directory group and organizationl unit... Read More

  2. Improving security through least-privilege practices

    In this article we will consider the successful implementation and management of the least-privilege principle and contemplate the challenges and benefits faced by organisations when addressing security through least-privilege... Read More

  3. Securing Active Directory with PowerShell

    In this article, we’re going to look at security as it relates to AD. In particular, we’ll look at how you can use PowerShell to ensure that several different security aspects of AD don’t drift. These scripts are designed for you to run them on a periodic basis to determine whether anything has changed with respect to your AD security... Read More

  4. The Hardening of the Core (Part 2) - Network Access Control

    Computing devices have become ubiquitous; people are using multiple devices and connect to networks for access to resources. The most recent strategy is, loosening the perimeter but hardening the core critical services. This article will focus on Network Access Control and the use of this mature technology to enable secure remote working... Read More

  5. User and Group Accounts: What is in a Name?

    This article will help you understand how to decrypt the user and group syntax that shows up in reports and GUIs throughout the enterprise... Read More

  6. The Evolution of Microsoft’s Rights Management Services (Part 2)

    In this article we’ll talk about the next generation of RMS, Azure RMS, which has been revamped in a big way and was released in public preview form this summer... Read More

  7. The Hardening of the Core (Part 1) - Security information and event management

    This article will focus on the importance of SIEM and why it is needed to achieve a higher level of security posture whilst hardening the core... Read More

  8. The Evolution of Microsoft’s Rights Management Services (Part 1)

    In this, Part 1 of our series on the evolution of Active Directory Rights Management Services, we provid an overview of what RMS is, how it works and some of the changes it has undergone from its release as an add-on for Windows Server 2003 back in 2005 to its incarnation in Windows Server 2012... Read More

  9. Are we heading for Identity Management Federation (Part 2)

    In this article we will cover federation and the benefits of true federation and how this area is starting to evolve... Read More

  10. Are we heading for Identity Management Federation? (Part 1)

    There are now more authentication methods than ever before, hardware has progressed to a point that can facilitate complex authentication processes. Are we on the verge of a federated era in the cloud? This article will explore the authentication possibilities and the possible outcomes of what may happen over the next five years in this space... Read More

Featured Links