Microsoft Active Directory Security News
July 15, 2014
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
May 07, 2010
The updated version of Microsoft's claims-based identity software has single sign-on capabilities for apps both on-premise and in the cloud.
December 04, 2008
Microsoft will embed data classification technology into its platform under a deal that ties Active Directory Rights Management Services with RSA's data loss prevention suite.
October 14, 2008
Microsoft patched dangerous holes in implementations of Active Directory on Windows 2000 Server and memory allocation issues with its Host Integration Server.
Microsoft Active Directory Security Get Started
Bring yourself up to speed with our introductory content
Active Directory Rights Management Services (AD RMS) is a security tool that provides a safeguard to prevent unauthorized access to data. Continue Reading
Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest. Continue Reading
It pays to know about Active Directory. Test your knowledge with a quick quiz. Continue Reading
Evaluate Microsoft Active Directory Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn why the Best Practice Analyzer (BPA) engine is on our list the top 10 new features for Windows Server 2008 R2. Continue Reading
Active Administrator 5.0.1 is an enterprise-class integrated Active Directory management and auditing tool from ScriptLogic Corp., which is designed to improve security and business continuity in Windows networks. Continue Reading
Specops Password Reset is an IT help desk technology designed to allow end users to securely reset and/or unlock their own Active Directory accounts. Continue Reading
Product ReviewsPowered by IT Central Station
Oracle Identity and Access Manager provide a comprehensive identity management and access control system that simplifies user access and usage monitoring across applications.Powered by IT Central Station
Valuable Features: Oracle Identity Management - Pros: •Automates user identity provisioning and deprovisioning and enables organizations to...Continue Reading
It's a complex product and it runs a bit slower than its competitors but it does automate user creation.Powered by IT Central Station
Valuable Features: Automated User Creation and provisioning of connected resources in the case of Identity Manager, Access control to protected...Continue Reading
The product is excessively resource intensive but it does streamline account lifecycle management and single sign on.Powered by IT Central Station
Valuable Features: Provisioning Single Sign On. • Improvements to My Organization: It has streamlined user account lifecycle...Continue Reading
Manage Microsoft Active Directory Security
Learn to apply best practices and optimize your operations.
In 2012, admins were interested in Group Policy and Windows Server 2012 when it came to Active Directory. These are the top tips. Continue Reading
If you think there’s no demand for Active Directory management services, think again. Active Directory cleanup and optimization services can be valuable to your customers. Continue Reading
Active Directory's Rights Management Services is a good way of managing access to data, but there are caveats. Continue Reading
Problem Solve Microsoft Active Directory Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Domain controllers are key to company security, so you need to keep them protected. Read on for advice on hardening virtual and physical environments. Continue Reading
Active Directory is vital to Windows. These best practices will help engineers prevent mistakes and ensure a stable AD environment. Continue Reading
Microsoft introduced the managed service accounts feature with Windows Server 2008 R2 to help make the management of apps like Exchange more secure. So how does it work? Continue Reading