Active Directory Security

Active Directory Security

Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

  • Home
  • About
  • AD Resources
  • Attack Defense & Detection
  • Contact
  • Mimikatz
  • Presentations
  • Schema Versions
  • Security Resources
  • SPNs
  • Top Posts

AD Resources

Here’s a list of free resources for getting/staying up to speed on Microsoft Windows Server and Active Directory:

  • AD Reading: Windows Server 2019 Active Directory Features
  • AD Reading: Windows Server 2016 Active Directory Features
  • AD Reading: Windows Server 2012 Active Directory Features
  • AD Reading: Windows Server 2008 Active Directory Features
  • AD Reading: How Key Active Directory Components Work
  • AD Reading: Active Directory Core Concepts
  • AD Reading: Active Directory Database
  • AD Reading: Active Directory Authentication & Logon
  • AD Reading: Active Directory DNS & Name Resolution
  • AD Reading: Active Directory Replication
  • AD Reading: Active Directory Read Only Domain Controller
  • AD Reading: Active Directory Backup and Disaster Recovery
  • AD Reading: Active Directory Client Interaction
  • AD Reading: Active Directory Group Policy
  • AD Reading: Active Directory DFS & FRS

If you are looking for the MCM/MCSM Active Directory Reading List I developed for the MCM/MCSM Directory Services (Windows Server 2012) program, it’s available on the Microsoft download site here: MCSM_Directory_Reading_List_June_2013.docx

(Visited 85,540 times, 11 visits today)

1 comment

    • Patrick Ngambi on May 8, 2014 at 2:19 am
    • #

    Thank you for this useful material.

Comments have been disabled.

Recent Posts

  • Attacking Active Directory Group Managed Service Accounts (GMSAs)
  • From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path
  • What is Azure Active Directory?
  • Slides Posted for Black Hat USA 2019 Talk: Attacking & Defending the Microsoft Cloud
  • AD Reading: Windows Server 2019 Active Directory Features

Trimarc Active Directory Security Services

Have concerns about your Active Directory environment? Trimarc helps enterprises improve their security posture.

Find out how... TrimarcSecurity.com

Popular Posts

  • Attack Methods for Gaining Domain Admin Rights in…
  • PowerShell Encoding & Decoding (Base64)
  • Kerberos & KRBTGT: Active Directory’s…
  • Finding Passwords in SYSVOL & Exploiting Group…
  • Securing Domain Controllers to Improve Active…
  • Securing Windows Workstations: Developing a Secure Baseline
  • Mimikatz DCSync Usage, Exploitation, and Detection
  • Detecting Kerberoasting Activity
  • Scanning for Active Directory Privileges &…
  • The Most Common Active Directory Security Issues and…

Categories

  • ActiveDirectorySecurity
  • Apple Security
  • Cloud Security
  • Continuing Education
  • Entertainment
  • Exploit
  • Hacking
  • Hardware Security
  • Hypervisor Security
  • Linux/Unix Security
  • Malware
  • Microsoft Security
  • Mitigation
  • Network/System Security
  • PowerShell
  • RealWorld
  • Security
  • Security Conference Presentation/Video
  • Security Recommendation
  • Technical Article
  • Technical Reading
  • Technical Reference
  • TheCloud
  • Vulnerability

Tags

ActiveDirectory Active Directory ActiveDirectoryAttack ActiveDirectorySecurity Active Directory Security ADReading ADSecurity AD Security DCSync DEFCON DomainController EMET5 GoldenTicket HyperV Invoke-Mimikatz KB3011780 KDC Kerberos KerberosHacking KRBTGT LAPS LSASS MCM MicrosoftEMET MicrosoftWindows mimikatz MS14068 PassTheHash PowerShell PowerShellCode PowerShellHacking PowerShellv5 PowerSploit Presentation Security SIDHistory SilverTicket SneakyADPersistence SPN TGS TGT Windows10 WindowsServer2008R2 WindowsServer2012 WindowsServer2012R2

Copyright

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned. Content Ownership: All content posted here is intellectual work and under the current law, the poster owns the copyright of the article. Terms of Use Copyright © 2011 - 2020.

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned.

Made with by Graphene Themes.