Active Directory is Microsoft’s enterprise directory service for on-premises environments. It can be connected to Azure Active Directory to create a hybrid environment.
Shared mailboxes are widely used in Exchange and their permissions are relatively simple to set and manage. In this blog, Jaap Wesselius deep dives into understanding Exchange shared mailbox permissions and walks you through how to grant permissions in different Exchange environments.
Join us for a thrilling Halloween special of the Practical 365 podcast with special guest Sean Metcalf, CTO of Trimarc. In this Episode, we'll explore the eerie changes in Windows 11 as it seeks to banish NTLM, navigate through common Active Directory misconfigurations, and delve deeper into the practical aspects of managing Active Directory configurations and so much more.
In this blog, James Yip reviews Microsoft's Entra ID Cross-Tenant Sync feature, and how it can make things a lot easier when deploying a M&A project.
At the end of March, Practical 365 traveled with the TEC European roadshow, traveling between three cities in Europe over a week, listening to experts talking primarily about security-focused topics aimed at improving your Microsoft 365, Azure AD and Active Directory. Read our whistle-stop tour of the most important points made by expert speakers.
Because of the way the Windows security model works, it’s not currently possible to eliminate the use of passwords for local administrator accounts. Given that fact, the next best solution is to remediate the biggest problems with passwords for these local accounts, including weakness, reuse, and tenure. In this article, we discuss how the Local Administrator Password Solution (LAPS) helps with all of those!
Active Directory has been around for almost 25 years. As such, one might expect that – by now – we would have figured out to keep it safe against attacks. Yet, it remains a weak point in many organizations' cybersecurity defenses. When coupled with the challenges mentioned above, this can be a recipe for disaster. Why is this the case?
Implementing zero trust in the world is a big hassle, often uncomfortable, and frequently dorky—plus, it can be expensive. At the same time, moving closer to a zero trust model helps harden your network significantly, and you may already have many of the tools and techniques you need available without much extra cost. In this article, we discuss how to take baby steps toward Zero Trust.