This website uses cookies to ensure you get the best experience on our website. Learn more
Brandon Lee has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.
Articles written by Brandon Lee
Sep
12
Enable Azure AD Password Protection in a hybrid environment
With default Active Directory password policies, many organizations find that users create weak, easily guessed, or incremental passwords that attackers can easily compromise. Using Azure AD Password Protection, organizations can have an additional layer of security for users' passwords. The…
Read MoreAug
31
Useful PowerShell commands for managing Active Directory password policies
Managing password policies in Active Directory is an essential task for a system administrator managing AD DS environments. Password policies help to enforce password policy best practices so passwords are not easily guessed or compromised. Managing and configuring password policy…
Read MoreAug
17
What’s Entra ID? Azure AD’s latest name change explained
If you’ve seen reference to ‘Microsoft Entra ID’ recently, it’s because Microsoft have rebranded Azure Active Directory (Azure AD) to become part of the Microsoft Entra product family. It will be a gradual process that started on July 11th and…
Read MoreJul
17
How does a brute force password attack work?
Compromising login credentials is the goal of many modern cyber-attacks. If successful, they can result in the worst types of data breaches, especially when high-level accounts are breached. One of the oldest and most common methods for guessing a user’s…
Read MoreMay
30
Business email compromise: Practical ways to reduce your risk
Everyone uses email – you’d struggle to find a business that doesn’t. Unfortunately, for a form of digital communication we’ve been using since the 80s, it’s still very easy for cybercriminals to attack. As a result, email is the starting…
Read MoreFeb
13
Securing authentication tokens by preventing delegation of admin accounts
The underlying capabilities provided by Kerberos authentication in Active Directory means that access tokens can be delegated to users and computers for various purposes. Attackers can capitalize on the built-in capabilities of Active Directory with impersonation and delegation to compromise…
Read MoreSep
12
Ransomware attacks continue to rage on government entities
Ransomware attacks are on the rise and target businesses across many industries and sectors. Government entities are also on the radar of ransomware gangs and have been the subject of many high-profile ransomware attacks. Governmental entities have been a high-level…
Read MoreSep
06
How to recover from a ransomware attack
It is arguably one of the most dreaded words for any organization today – ransomware. Ransomware can bring a bustling, thriving, profitable business to its knees in hours. The aftermath can lead to a ripple effect of lost revenue, and…
Read MoreAug
23
Active Directory and domain controller security best practices
Windows Servers in the environment housing the Active Directory Domain Services (AD DS) role are some of the most sought-after targets for attackers today. It is because Active Directory contains the credential store for all the user and computer accounts…
Read MoreAug
15
SolarWinds hack explained: Weak password “solarwinds123” cause of SolarWinds Hack
When you look at many of the high-profile breaches that have taken place in recent years, many of them had a common denominator - weak or compromised passwords. Weak passwords are easily compromised and can lead to significant breach events…
Read More