You've requested...

Directory and Resource Administrator 7.5 Trial

If a new window did not open, click here to view this asset.

Download this next:

22-point checklist for Active Directory security

Because of Active Directory’s key role in Windows-based environments, it exists as a major target for threat actors.

So, how can you level up your Active Directory security in the face of proliferating cyberattacks?

Enter the Active Directory Security Checklist, which breaks down 22 steps you can take to strengthen your security posture.

Guidance includes to:

  • Reduce the number of Domain Admins
  • Promote using longer passphrases (opposed to complex passwords)
  • And more

Keep reading to unlock the complete guidance.

These are also closely related to: "Directory and Resource Administrator 7.5 Trial"

  • Modernize Microsoft workloads on AWS - ebook guide

    Explore modernizing Microsoft workloads on AWS in this e-book, covering rehosting, re-platforming, refactoring, and rearchitecting. Learn the advantages of updating .NET applications, SQL Server, and Active Directory, such as improved flexibility, scalability, and security, alongside cost reductions.

    Discover the AWS Optimization and Licensing Assessment, a complimentary tool for enhancing your Windows setup and minimizing expenses.

    Gain insights on how modernization fosters innovation, agility, and a competitive edge. Modernize your Microsoft workloads on AWS to thrive in a dynamic market.

  • Comparing Azure Active Directory options

    Like Active Directory, Azure AD provides authentication and access control services but has been specifically designed to support the unique needs of cloud users and cloud apps. Microsoft offers four Azure AD editions with varying levels of functionality. This infographic outlines how they compare so you can weigh up which edition is the best fit for your organisation.

Find more content like what you just read:

  • Just-In-Time Privilege: Secure your Active Directory access

    As the de facto authentication method for many enterprises, Active Directory (AD) is a consistent target for cybercriminals. Just-In-Time Privilege from One Identity is designed to protect within AD by removing access to those not currently using the privilege. Download this white paper to learn more about Just-In-Time Privilege.

    Download

  • Migrate large SQL Server databases to Amazon RDS Custom using FSx

    Migrate a multi-TB SQL Server database to Amazon RDS Custom for SQL Server using Amazon FSx for Windows File Server. This post presents a solution to address common migration challenges and avoid storage overprovisioning. Download to learn more.

    Download

  • Manage unmonitored guests & secure against supply chain attacks

    Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.

    Download

  • Security leader’s guide to Active Directory best practices

    Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.

    Download

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

    Download

  • Top IT security priorities: Addressing risk management and compliance

    In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • Selecting digital solutions for better patient access & experience

    This white paper highlights ways to enhance patient access and experience through digital solutions. Discover 4 crucial factors for selecting patient engagement tech for your digital front door in the full white paper.

    Download

  • NIS2 Compliance: 9-Point Checklist

    In its updated directive, NIS2 expands its scope, impacting new sectors like energy, banking and more. So, does your organization fall under the new scope? Find out in this white paper, which provides a 9-point checklist for achieving NIS2 compliance.

    Download

  • A Computer Weekly buyer's guide to multicloud

    Enterprise's shift towards multicloud is ever-increasing. Computer Weekly looks at the importance of software-defined wide area networks in successful migration, the complications that come with juggling clouds and Microsoft's journey into multicloud support.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • SailPoint, IBM, Oracle, and more: Comparing IGA vendors

    Traditionally, identity governance administration (IGA) was called the passive side of governance, where organizations would implement largely on premises to improve their regulatory compliance positions. This report provides an overview of the current IGA solution market, highlighting and comparing the leading vendors. Read on to learn more.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • MicroScope - July-August 2024: Is it worth taking a risk?

    In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI

    Download

  • 217 IT directors’ insights on software supply chain security

    How are regulatory initiatives like the Biden administration’s “Securing Open Source Software Act” impacting software development and security? To find out, Censuswide surveyed 217 IT directors. Review the findings in this 9-page report by Sonatype.

    Download

  • Today's attacks target people, not just technology

    Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.

    Download

  • Anticipate, prevent, and minimize the impact of business disruptions

    Read this guide to discover how you can enable confident risk-based decisions across business and IT by building a proactive, comprehensive and competitive resilience strategy—especially in times of uncertainty and disruption.

    Download

  • New data privacy laws on the horizon: How businesses can prepare

    As data privacy legislation like ADPPA looms, companies must proactively prepare by prioritizing compliance, security, and user trust. MetaRouter empowers businesses to navigate evolving regulatory landscapes and build ethical data practices. Read the full blog post to discover how.

    Download

  • Focus: Application Virtualisation

    This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.

    Download

  • Improve Your Bottom Line with Simplified and Connected Invoice Management Processes

    In this eGuide, you will hear that by digitalizing and automating processes and using machine learning and AI capabilities, you can streamline AP management and support regulatory compliance while improving visibility and control.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • AIRI—An NVIDIA DGX BasePOD certified reference architecture

    Download this e-book for a prescriptive reference architecture to help IT administrators to deploy a validated solution designed for inference, data exploration, and other computationally intensive algorithms that enable AI today.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • How to Effectively Close the SecOps Gap

    Managing the balance between security and system performance is challenging due to their different priorities. Take a short survey to access our free whitepaper now on filling the SecOps gap to create effective collaboration between systems.

    Download

  • Infographic: Windows 11 vs. Windows 10

    The new Windows 11 was launched last year and have some features that might be worth considering. Even though support for Windows 10 won't end anytime soon, some of the new features can be an advantage depending on your needs. To help you decide if upgrading is right for you, here are some of the differences between Windows 11 and Windows 10.

    Download

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

    Download

  • Improving payer-provider collaboration in healthcare with AI

    Due to a dependence on legacy technology, many clinical teams have been forced to perform more unnecessary administrative tasks and spend less time on clinical interventions. Read on to discover how fully leveraging AI can improve understanding and communication between payers and providers and drive more efficient health outcomes.

    Download

  • Goodbye Windows 7, IR35 woes, Six Nations, and IT at Davos

    In this week's episode of the Computer Weekly Downtime Upload podcast, Caroline Donnelly and Brian McKenna are joined by Cliff Saran to discuss the end of support of Windows 7, IR35 in the private sector, Will Carling and AWS in respect of the Guinness Six Nations Rugby Union tournament, and IT at Davos.

    Download

  • Compliance Field Guide: Reducing Costs in an Increasingly Regulated World

    This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.

    Download

  • How enterprises can keep up with global tax & regulatory compliance

    Spinnaker Support's Global Tax and Regulatory Compliance solution helps enterprises manage tax and regulatory requirements. This personalized service offers a standardized process, customized solutions, and comprehensive support to ensure compliance. Access this white paper to learn how it can benefit your organization.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Automate to Accelerate: Overcoming Staffing and Compliance Challenges in Cyber Risk Management

    Security teams spend hundreds of hours each year gathering controls evidence to demonstrate regulatory compliance. With more requirements on the horizon and an expanding cyber threat landscape, that burden only stands to increase. The most effective path out of the mire of manual evidence collection? Automation. Download this white paper.

    Download

  • Balancing collaboration with compliance

    Emerging collaboration technologies have forced IT and business leaders to face the challenge of embracing innovation, while also ensuring regulatory compliance. This eBook, produced by Metrigy Research, explores the best practices for how companies can enable collaboration and align with regulatory compliance requirements. Read on to learn more.

    Download

  • Utilization management: How AI can help patients & providers

    In this white paper, you’ll discover how AI/ML deployed in operational contexts is becoming a valuable tool to meet the challenge of modernizing health systems and maintaining utilization management. Read on to understand how AI/ML-driven automation can dramatically improve traditional workflows for payers, providers, and ultimately, patients.

    Download

  • Third party analysis of access governance: One Identity, IBM, & other providers

    The Access Governance (AG) market continues to evolve. Produced by KuppingerCole Analysts, this Leadership Compass will give an overview and insights into the Identity Governance and Administration (IGA) market, providing you with a compass to help you find the products that can meet your needs. Read on to learn more.

    Download

  • How AI is revolutionizing healthcare authorizations

    In this webinar, a panel of industry experts will showcase AI tools that assess member data in real-time, offering clear insights to refine the authorization process. Tune in now to discover how AI is revolutionizing healthcare authorizations.

    Download

  • Modernizing Security: Proactive PAM Solutions for Today

    In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.

    Download

  • 10 benefits of AI-powered identity compliance

    Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.

    Download

  • Artificial Intelligence Can Enhance Health Plan Operations When Used Correctly

    Health plans must fully understand artificial intelligence tools before using them to assist with coverage determinations or administrative tasks.

    Download