aidarrow-end-inversearrow-endarrow-left-angulararrow-left-angularWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareArticleUse caseWebinarResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
10/26/2011 1:19:42 PM
Contributor:
Russell Smith

Assigning admin privileges on Domain Controllers

Active Directory (AD) is the core of a Windows Server network and consists of a database that stores usernames and passwords, plus several technologies that work together to provide security and management services to clients and servers. Domain controllers (DCs) are servers that host a copy of the AD database and run related services.

Continue reading
Date published
10/11/2011 10:02:02 AM
Contributor:
Jeremy Moskowitz

What is the Right Amount of GPOs?

This is a question I get all the time, so I thought I'd take a moment and share some thoughts on this question. Before we get to "What is the right amount of GPOs", let’s start off with "Can I have too many GPOs?"

Continue reading
Date published
10/6/2011 9:50:41 AM
Contributor:
Kris Zentek

Who Has Admin Rights?

Before implementing a least privilege desktop policy it is generally good practice to know who you are likely to affect. This is not an easy task if you do not already manage or track which users have previously been given local admin rights on their devices.

Continue reading
Date published
9/21/2011 8:23:32 AM
Contributor:
Russell Smith

Do Users Really Know Best?

The consumerisation of IT has become a fashionable catch phrase over the past few years as some companies choose to give employees the option to decide what hardware and software they use at work. Schemes have been set up, such as Bring Your Own PC (BYOPC), where virtualization technologies are deployed that allow users to run a managed corporate desktop from their own device with the aim of reducing costs.

Continue reading
Date published
9/20/2011 2:49:22 PM
Contributor:
Kris Zentek

Signing policies in Privilege Guard 2.8

Privilege Guard 2.8 (Edit: now Defendpoint) introduces the ability to digitally sign policies using a certificate from a PFX file. This ensures that the policies deployed to a client have been published by a trusted source and are genuine. A unique Object Identifier (OID) is used to verify that policies have been signed with an authorized certificate.

Continue reading
  1. 1
  2. ...
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
26