Category Archives: Technical

How to Audit Active Directory Group Memberships

Hello, In today’s short post, Part 3 of How to Perform Simple Active Directory Audits, we’ll take a quick look at how IT administrators, IT managers and IT and cyber security auditors can easily and instantly audit and enumerate the complete membership of any domain (Active Directory) security group, no matter how large or complicatedly […]

How to Audit Active Directory to Identify Computer Accounts Trusted for Unconstrained Delegation

Hello, In today’s short post, part 2 of How to Perform Simple Active Directory Audits, we’ll take a quick look at how IT admins, IT managers, IT consultants as well as IT and Cyber Security auditors can easily audit Active Directory to identify all domain-joined computers in an Active Directory domain whose domain computer accounts […]

How to Perform a Basic Active Directory Audit

Hello, In today’s short post, which is part 1 of our posts on How to Perform Simple Active Directory Audits, we’ll take a quick look at how IT administrators, IT managers, IT consultants as well as IT and Cyber Security auditors worldwide can easily perform a basic Active Directory Audit using the free version of […]

How to Find Stealthy Admins in Active Directory

Folks, As you may know, lately Active Directory Security seems to have been getting a lot of attention from traditional network security / hacking / cyber security folks (both on the good and the not-so-good side), many of whom may actually be new to the subject of Active Directory Security, and most of whom seem […]

Active Directory Effective Permissions

Folks, Today, I would like to cover a paramount cyber security topic, one┬áthat is at the very heart, root and foundation of organizational cyber security worldwide – Active Directory Effective Permissions.   Before I share its technical and other salient aspects, I should mention that not a single organization in the world that today operates […]