As security breaches continue to grow, businesses should operate under the assumption that they will be breached. A cyber insurance policy protects businesses against the costs associated with law suits, investigations, and downtime. Read More
Specops Software Blog
Troubleshooting user account permissions – AdminSDHolder
Specops Password Reset, Specops Password Sync, uReset, and Specops Authentication all use low privilege service accounts in Active Directory. When you add an OU or OUs to your management scope, we delegate extremely granular permissions for our service account... Read More
Windows 10 As a Service Imaging (WaaS) with Specops Deploy
Windows 10 Operating Systems have changed and so have the strategic options available to deploy and maintain the operating system in the Enterprise. Imaging has traditionally been used to apply an operating system with a consistent look and feel.... Read More
Pattern-based passwords are not secure – here is how you can block them
Password complexity is believed to increase security, but it can also motivate predictable password patterns. Passwords inspired by adjacent key movements, such as "qwerty" are extremely vulnerable. Read More
MFA vs. 2FA – why the difference matters for your O365 implementation
When it comes to protecting cloud applications such as O365, two-factor authentication (2FA) has some serious limitations. A dynamic MFA solution frees users from passwords, and secures the authentication process. Read More
Leetspeak passwords – predictable and crackable
Leetspeak enables users to create passwords that are easy to remember, and easy crack. By preventing users from utilizing character substitution during password creation, Specops Password Policy can guide users towards stronger passwords. Read More
Why is Office 365 MFA important?
Office 365 is a hot target for attacks. Protecting organizational data in Office 365 comes down to preventing various attacks designed to gain access to user accounts. Read More
Press release: Block 1 billion leaked passwords with Specops Password Policy
IT departments can now use Specops Breached Password Protection, a hosted service with a continuously updated list of leaked passwords, to prevent users from utilizing high-risk passwords. Read More
Copying data from one attribute to another attribute in Active Directory
We often have customers that want to allow their users to use their mobile device as an identity service for our self-service solutions. By default, we use the ‘mobile’ attribute in AD as it automatically enrolls a user into... Read More
Custom ADMX templates for the Specops Authentication Client with Specops Password Reset
One of the great things about Specops Software solutions is that they are designed to require as little installation effort as possible. This means that our customers can get a system up and running very quickly, usually zero impact... Read More