Blog

Active Directory

Identity is the Biggest Blind Spot in Data Security

Why Identity is the Biggest Blind Spot in Data Security

Shawn Hays

Shawn Hays

Modern Data Security Platforms (DSP) must integrate identity risk and context for effective posture management, threat detection, and response.

New Microsoft 365 Organizational Messages Cause for Concern

New Organizational Messages Feature in Microsoft 365 a Potential Risk

Shawn Hays

Shawn Hays

The new organizational messages feature for Microsoft 365 enhances how IT and security teams communicate with users at scale, but also generates risks.

Azure Managed Identities: Definition, Types, Benefits + Demonstration

Neeraj Kumar

Neeraj Kumar

Use this guide to learn about Azure managed identities: What they are, how many types there are, and what benefits they offer, plus how they work.

Group Policy Objects (GPOs): How They Work & Configuration Steps

David Harrington

David Harrington

Group Policy Objects (GPOs) let system admins control and implement cybersecurity measures from a single location. Learn about GPOs and how they work here.

12 Group Policy Best Practices: Settings and Tips for Admins

Jeff Brown

Jeff Brown

Group Policy configures settings, behavior, and privileges for user and computers. In this article, you’ll learn best practices when working with Group Policy.

Securing Azure Blob Storage: Set-Up Guide

Jeff Brown

Jeff Brown

Security is vital in today’s cloud-first environment. Cloud services are often enabled to solve an issue quickly, but no one goes back to verify if security best practices have been…

Understanding Azure DevOps and Building CI/CD Pipeline

Neeraj Kumar

Neeraj Kumar

Are you interested in learning about the tool that helps to automate and manage the complete software development lifecycle? Well, Azure DevOps is the answer for you, but before we…

Exploring ARM Templates: Azure Resource Manager Tutorial

Jeff Brown

Jeff Brown

Are you tired of clicking around the Azure portal creating virtual machines, storage accounts, and app services? Do you need a reliable method of creating the same environment multiple times?…

How to Create an Azure Virtual Network

Jeff Brown

Jeff Brown

Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.

How to Use Azure Private Endpoints to Restrict Public Access to WebApps

Neeraj Kumar

Neeraj Kumar

Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.

Group Policy Editor Guide: Access Options and How to Use

Michael Buckbee

Michael Buckbee

Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.

Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks

Michael Buckbee

Michael Buckbee

WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.

Prev

1 2 3 4

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.