Since we started school, we have received requests from around the world for there to be a single place where folks can easily find these entries, so this blog post serves to fulfill that request.
30-Days of Active Directory Security Schooling for Microsoft –
Here are the entries –
- Day 0 – A Trillion Dollar Letter to Microsoft concerning Cyber Security Worldwide
- Day 1 – How Well Does Microsoft Understand Cyber Security?
- Day 2 – The Importance of Active Directory Security
- Day 3 – The Impact of an Active Directory Security Breach
- Day 4 – The Active Directory Attack Surface
- Day 5 – The Top-5 Security Risks to Active Directory Deployments
- Day 6 – A Trillion Dollar Active Directory Privilege Escalation Example
- Day 7 – Lack of Gravitas at Organizations + Risks of Amateur Tooling
- Day 8 – An Ocean of Access Privileges in Active Directory Deployments
- Day 9 – A Most Important Microsoft Video on Defending Active Directory
- Day 10 – Active Directory Effective Permissions – Paramount to Cyber Security
- Day 11- A Trillion $ Question to Microsoft regarding “Identities” and Cyber Security
- Day 12- How to Correctly Audit Who can Create User Accounts in Active Directory
- Day 13 – Microsoft, How Do Organizations Prevent this Denial-of-Service Attack on Active Directory?
- Day 14 – How to Audit Who can Delete an Organizational Unit in Active Directory
- Day 15 – A Trillion $ Question to Microsoft regarding Domain Security Groups
- Day 16 – How to Audit Who can Change Group Memberships in Active Directory
- Day 17 – Implications of An Unauthorized Change to a Service Connection Point in Active Directory
- Day 18 – How to Audit Who Can Change/Control/Delete a Service Connection Point in Active Directory
- Day 19 – Implications of an Unauthorized Change to Domain Computer Accounts in Active Directory
- Day 20 – Microsoft, Have 1000s of Major Organizations Been Furnishing Inaccurate Evidence to Demonstrate Compliance of Access Rights in Active Directory?
In days to come, as we continue to proceed with schooling for Microsoft, I’ll have my staff keep this blog post updated. BTW, you may also find this interesting – The Cyber Security Blog