tag:blogger.com,1999:blog-5040918922484993247.post3952527177065773702..comments2012-10-31T13:07:32.208-07:00Comments on Active Directory Port 389: Hello World!Armenhttp://www.blogger.com/profile/10004753394073030538noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-5040918922484993247.post-26688833536723668152012-10-31T13:07:32.208-07:002012-10-31T13:07:32.208-07:00Hi Hafez,
I think of Active Directory Security as...Hi Hafez,<br /><br />I think of <a href="http://www.activedirsec.org" rel="nofollow">Active Directory Security</a> as being critical to business these days and <a href="http://www.active-directory-auditing-tool.com" rel="nofollow">Active Directory Auditing</a> is very important.<br /><br />Personally, I've found that the need to audit what is being audited in Active Directory is equally important as well.<br /><br />I recently came across a cool <a href="http://www.active-directory-acl-exporter.com" rel="nofollow">Active Directory ACL Export/Dump Tool</a> and have been using it for these audits.<br /><br />I thought you might find my experience with <a href="http://windows-security-log-events.blogspot.com/2012/10/how-to-audit-find-out-what-is-being.html" rel="nofollow">How to audit / find out what is being audited in Active Directory</a> helpful so thought of sharing it with you.<br /><br />Adios,<br />WillWill.Rhttps://www.blogger.com/profile/02328547654892503316noreply@blogger.comtag:blogger.com,1999:blog-5040918922484993247.post-13058591253631613362012-10-31T12:45:04.971-07:002012-10-31T12:45:04.971-07:00Hi Armen,
I happened to come across your blog, so...Hi Armen,<br /><br />I happened to come across your blog, so thought I'd leave a note.<br /><br />I've been wanting to blog for a while now, and have a little blog of my own as well over as <a href="http://activedir-forestry.blogspot.com/" rel="nofollow">Active Directory Forestry</a>, but I just can't seem to find the time.<br /><br />We've been very busy helping clients understand <a href="http://activedir-forestry.blogspot.com/2012/10/how-to-analyze-and-audit-security.html" rel="nofollow"> how to analyze and audit security permissions in Active Directory</a> because it is so important to <a href="http://www.activedirsec.org/" rel="nofollow">Active Directory security</a>.<br /><br />We came across a valuable <a href="http://www.active-directory-audit-tool.com/" rel="nofollow">Active Directory Audit Tool</a> and its been very helpful as we perform many an <a href="http://www.active-directory-audit.com/" rel="nofollow">Active Directory Audit</a> for our clients. Thought I mention it.<br /><br />If you have some time, do stop by. I would love to hear from you.<br /><br />Sincerely,<br />BenBen.Phttps://www.blogger.com/profile/12138068040807100456noreply@blogger.comtag:blogger.com,1999:blog-5040918922484993247.post-65000814687991141232012-10-31T12:00:34.232-07:002012-10-31T12:00:34.232-07:00Hello Abdul,
In my experience as an IT analyst, I...Hello Abdul,<br /><br />In my experience as an IT analyst, I have found that while many organizations use Active Directory so extensively, most of them don't seem to be aware of the various <a href="http://windows-kerberos-authentication.blogspot.com/2012/10/active-directory-security-risks-loom.html" rel="nofollow">Active Directory Risks</a> that exist today, and how these risks impact <a href="http://www.activedirsec.org" rel="nofollow">Active Directory Security</a>. This is concerning because Active Directory is so widely deployed today and I worry that it may be vulnerable, whether to Kerberos-to-NTLM downgrade attacks, or other kinds of attacks such as <a href="http://www.activedirsec.com/privilege_escalation.html" rel="nofollow">Active Directory Privilege Escalation</a> which it seems could be launched by insiders as well.<br /><br />Best wishes,<br />AndrewAndyhttps://www.blogger.com/profile/10358591472580326498noreply@blogger.comtag:blogger.com,1999:blog-5040918922484993247.post-36725444209012203892012-10-31T10:52:38.619-07:002012-10-31T10:52:38.619-07:00Hello Abdul,
What are your thoughts about the sec...Hello Abdul,<br /><br />What are your thoughts about the security implications of outsourcing the management of critical IT services like DNS, DHCP, Active Directory, email (Exhange) etc. to outsourced providers. I think <a href="http://the-art-of-management.blogspot.com/2012/10/outsourcing-of-microsofts-active.html" rel="nofollow">outsourcing of Microsoft's Active Directory technology impacts global security</a> but I would like to hear your thoughts on the same.<br /><br />Thanks,<br />Rajiv.RajivShttps://www.blogger.com/profile/05180001093663501070noreply@blogger.com