Are there any consequences for ignoring IT security? A month doesn’t go by without new reports of companies and organizations suffering from data breaches. Unfortunately, this is just the beginning. The frequency of data breaches is on the rise,... Read More
Specops Software Blog
How to change user passwords in Active Directory
We often get asked how our self-service solution changes passwords on a user account in Active Directory. It’s a more interesting question than it sounds as there are many processes at work here, and many ways to do it.... Read More
Specops Authentication enrollment data in Active Directory
The Specops Authentication cloud platform is unique in that user data is stored in the customer’s on-prem Active Directory database. Usernames, passwords, and enrollment data/proofs for the various Identity Services provided by Specops Authentication are stored in the customer’s... Read More
Specops Authentication Client and Duo Authentication for Windows Login
The Specops Authentication Client provides enhancements to the Windows logon experience by wrapping the built-in Windows credential provider (GINA). This includes allowing users to reset their passwords from the login screen, as well as enhancing the feedback users receive... Read More
Specops launches self-service encryption key recovery
Stockholm – Specops Software announced today the release of Specops Key Recovery. The solution addresses the common occurrence of encryption device lockouts by enabling users to unlock computers encrypted or managed by Symantec Endpoint Encryption. Rather than calling the... Read More
What is a password dictionary attack?
A password dictionary attack is a brute-force hacking method used to break into a password-protected computer or server by systematically entering every word in a dictionary as a password. Read More
Cyber Essentials Password Policy
Passwords play an important role in the Cyber Essentials scheme. If you are planning for Cyber Essentials accreditation, you will need to make sure your password policy is up to the challenge. Read More
Identity verification best practices
Identity verification must consider the level of access being granted, the type of data being accessed, and the action being performed. Read More
Fix: A required device isn’t connected or can’t be accessed
We have had a few support calls where customers using Specops Deploy OS are running into trouble while PXE booting computers for installation. The error message is as follows and it appears shortly after Windows PE starts to load.... Read More
Sync passwords between Active Directory domains
There are many reasons why you might want to sync a password between two Active Directory (AD) domains. We commonly see requests from customers who are looking at migrating their users from one domain to another. This could be... Read More