Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Audit Admin and User Permission Changes in Active Directory and Files Using Netwrix Auditor

How to Audit Admin and User Permission Changes in Active Directory? In this video, we’ll demonstrate how to audit administrative and user permission changes in Active Directory using a tool called "Netwrix Auditor". By tracking critical configuration changes, from admin modifications to sensitive file share permissions, you can maintain a culture of accountability within your organization.

Identity Threat Detection & Response: Protecting Active Directory - Crown Jewel of IT Infrastructure

Your Directory Is Your Crown Jewel; hence, it needs to be Protected at All Costs! If attackers wipe out your Active Directory, recovery could take months, not weeks. Incidents like the Maersk ransomware attack and Ukraine’s border wipeout highlight the devastating effects of directory breaches. Destructive wiper attacks are now 5x more common than before.

Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection

One Identity, a leader in unified identity security, today announced that One Identity Active Roles has been named a winner in the Hybrid Active Directory Protection category of the 2025 Cybersecurity Excellence Awards. This recognition highlights One Identity's ongoing commitment to providing robust identity management solutions that help organizations secure their hybrid Active Directory (AD) environments.

AS-REP Roasting Attack Explained | Real-Life Active Directory Exploit Demo

What is AS-REP Roasting? AS-REP Roasting is an attack that exploits misconfigured Active Directory accounts with disabled Kerberos pre-authentication. Attackers can retrieve password hashes and crack them with minimal effort, leading to unauthorized access. Watch This Real-World Attack Demo Jon Obst, Director of Research at Netwrix, demonstrates: How to Prevent AS-REP Roasting Protect your organization with proactive security controls.

The importance of Tier 0 and what it means for Active Directory

Your business depends on the protection of your most critical assets. Prioritizing Tier 0 assets and deploying a tiered administration model is a great way to strengthen the security protecting what matters most – your identities. We will discuss both of these concepts in detail in this post.

Why Does Having a Comprehensive Active Directory Management Tool Make Your Life Easy?

Discover how Active Directory Management Tools simplify IT operations, enhance security, automate tasks, and improve compliance. Learn why AD tools are essential for a secure and efficient IT environment.

Simply AD group management

Managing AD group membership using native tools can quickly become overwhelming. However, most cybersceurity insurance policies and compliance standards also mandate a regular review and recertification of group memberships to avoid huge penalties. Eric Hibar, One Identity solutions engineer, explains the best path forward to solve your group management headaches.

Active Directory Incident Response: Key Things to Keep in Mind

Active Directory (AD) is crucial for network security as it controls access to sensitive data, making it a primary target for attackers. Even a small AD breach can result in significant data loss, operational downtime, and reputational damage in a business.