Active Directory
Why Identity is the Biggest Blind Spot in Data Security
Dec 17, 2024
Modern Data Security Platforms (DSP) must integrate identity risk and context for effective posture management, threat detection, and response.
New Organizational Messages Feature in Microsoft 365 a Potential Risk
Nov 10, 2024
The new organizational messages feature for Microsoft 365 enhances how IT and security teams communicate with users at scale, but also generates risks.
Azure Managed Identities: Definition, Types, Benefits + Demonstration
Oct 05, 2022
Use this guide to learn about Azure managed identities: What they are, how many types there are, and what benefits they offer, plus how they work.
Group Policy Objects (GPOs): How They Work & Configuration Steps
Jun 15, 2022
Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.
12 Group Policy Best Practices: Settings and Tips for Admins
Apr 04, 2022
Group Policy configures settings, behavior, and privileges for user and computers. In this article, you’ll learn best practices when working with Group Policy.
Securing Azure Blob Storage: Set-Up Guide
Aug 25, 2021
Security is vital in today’s cloud-first environment. Cloud services are often enabled to solve an issue quickly, but no one goes back to verify if security best practices have been…
Understanding Azure DevOps and Building CI/CD Pipeline
Jun 30, 2021
Are you interested in learning about the tool that helps to automate and manage the complete software development lifecycle? Well, Azure DevOps is the answer for you, but before we…
Exploring ARM Templates: Azure Resource Manager Tutorial
Jun 28, 2021
Are you tired of clicking around the Azure portal creating virtual machines, storage accounts, and app services? Do you need a reliable method of creating the same environment multiple times?…
How to Create an Azure Virtual Network
Jun 14, 2021
Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
Mar 25, 2021
Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.
Group Policy Editor Guide: Access Options and How to Use
Feb 19, 2021
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
Jan 29, 2021
WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.
Try Varonis free.
Deploys in minutes.