Microsoft identity and access management
The distributed nature of the modern workforce requires administrators who are adept at handling Microsoft's identity and access management products to streamline the authentication process and prevent unauthorized access to resources. Get tips to manage identities properly and prevent any security lapses in the enterprise.
Top Stories
- 
				Tip
					08 Oct 2025
					
									
										
									
								Test conditional access with Microsoft Entra ID What If tool
Admins should employ regular use of this simulation tool to ensure conditional access policies have no conflicts and avoid access problems that can slow down users. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
				Tutorial
					19 Sep 2025
					
									
										
									
								How to join Linux to an Active Directory domain
This tutorial explains the benefits of this integration, how to connect Linux systems to the Microsoft directory service and how to troubleshoot authentication issues. Continue Reading
By 
- 
                Tip
                09 Jun 2025
                
                                    
                                Fix Active Directory account lockouts with PowerShell
Entering the wrong credentials so many times can block users from logging in. This tutorial explains how to find and correct these issues and other lockout events. Continue Reading
By - 
                Definition
                21 May 2025
                
                            
                            What is a passkey?
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords. Continue Reading
By- Mary E. Shacklett, Transworld Data
 - Amanda Stevens
 
 - 
                Definition
                19 May 2025
                
                            
                            What is Universal 2nd Factor (U2F)?
Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account. Continue Reading
By - 
                Definition
                21 Apr 2025
                
                            
                            What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. Continue Reading
By- Mary E. Shacklett, Transworld Data
 - Katie Terrell Hanna
 
 - 
                Definition
                11 Apr 2025
                
                            
                            What is Active Directory (AD)?
Active Directory (AD) is Microsoft's proprietary directory service that enables network admins to manage users, permissions and their access to networking resources. Continue Reading
By- Rahul Awati
 - Wesley Chai
 - Alexander S. Gillis, Technical Writer and Editor
 
 - 
                Definition
                10 Mar 2025
                
                            
                            What is Kerberos and how does it work?
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Continue Reading
By- Rahul Awati
 - Peter Loshin, Former Senior Technology Editor
 - Michael Cobb
 
 - 
                Tip
                28 Feb 2025
                
                                    
                                Why and how to create Azure service principals
Service principals are a convenient and secure way to protect Azure resources. Follow this step-by-step guide to create a service principal that defends vital Azure workloads. Continue Reading
By - 
                Definition
                27 Feb 2025
                
                            
                            What is a domain controller?
A domain controller is a server that processes requests for authentication from users and computers within a computer domain. Continue Reading
By- Gavin Wright
 - Peter Loshin, Former Senior Technology Editor
 
 - 
                Definition
                25 Feb 2025
                
                            
                            What is Active Directory Domain (AD Domain)?
An Active Directory domain (AD domain) is a collection of objects within a Microsoft Active Directory network. An object can be a single user or a group, or it can be a hardware component, such as a computer or printer. Each domain holds a database containing object identity information. Continue Reading
By- Rahul Awati
 - Stephen J. Bigelow, Senior Technology Editor
 - Ben Rubenstein, Senior Manager, Social Media and Online Community
 
 - 
                Definition
                31 Jan 2025
                
                            
                            What is a certificate revocation list (CRL) and how is it used?
A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date. Continue Reading
 - 
                Definition
                31 Jan 2025
                
                            
                            What is biometric verification?
Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Continue Reading
By- Michael Cobb
 - Alexander S. Gillis, Technical Writer and Editor
 - Rahul Awati
 
 - 
                Definition
                30 Jan 2025
                
                            
                            What is a password?
A password is a string of characters used to verify the identity of a user during the authentication process. Continue Reading
By- Rahul Awati
 - Madelyn Bacon, TechTarget
 
 - 
                Definition
                23 Dec 2024
                
                            
                            What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data. Continue Reading
By - 
                Definition
                19 Dec 2024
                
                            
                            What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. Continue Reading
By - 
                Definition
                17 Dec 2024
                
                            
                            What is PKI (public key infrastructure)?
PKI (public key infrastructure) is the underlying framework that enables the secure exchange of information over the internet using digital certificates and public key encryption. Continue Reading
By - 
                Definition
                09 Dec 2024
                
                            
                            What is user authentication?
User authentication refers to the process of verifying the identity of a user attempting to gain access to a computer network, system or device. This process runs in the background and can be done through different means, such as asking the user to enter a password, provide a PIN or provide a fingerprint. Continue Reading
By - 
                Tip
                02 Jul 2024
                
                                    
                                How to secure Azure Functions with Entra ID
Centralized identity management is vital to the protection of your organization's resources. Do you know how to secure Azure Functions with Entra ID to optimize data security? Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Definition
                21 Jun 2024
                
                            
                            OpenID (OpenID Connect)
OpenID Connect is an open specification for authentication and single sign-on (SSO). Continue Reading
By - 
                Tutorial
                30 May 2024
                
                                    
                                Streamline Microsoft 365 onboarding with PowerShell
Learn how to simplify user provisioning in the cloud collaboration platform with faster results by seeing examples of scripts that work with Microsoft Graph. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tutorial
                23 May 2024
                
                                    
                                Automate Microsoft 365 user offboarding with PowerShell
Automation is a good way for admins to handle all the tasks associated with removing a user from the organization's tenant in Microsoft's cloud-based productivity platform. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tutorial
                17 May 2024
                
                                    
                                How to use PowerShell for Exchange Online monitoring
Many enterprises rely on Exchange Online for more than just email. Admins need to stay on top of this important service to pinpoint when problems occur to resolve them quickly. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tutorial
                13 May 2024
                
                                    
                                How to manage Microsoft 365 guest users with PowerShell
The flexible automation tool used in conjunction with Microsoft Graph can give admins the right combination to quickly tackle a range of tasks related to guest user management. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tip
                30 Apr 2024
                
                                    
                                How to avoid Microsoft 365 management pitfalls
A migration to the cloud collaboration platform requires a command of the multiple admin portals available to admins to help the organization make the most of its subscription. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tip
                16 Apr 2024
                
                                    
                                New Active Directory features coming in Windows Server 2025
The upcoming Windows Server release will bring significant enhancements to Active Directory, including a new functional level and security and performance improvements. Continue Reading
By - 
                Definition
                12 Apr 2024
                
                            
                            OAuth (Open Authorization)
OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet. Continue Reading
 - 
                Definition
                28 Mar 2024
                
                            
                            retina scan
Retina scanning is a biometric authentication technology that uses an image of an individual's retinal blood vessel pattern as a unique identifying trait for access to secure installations. Continue Reading
By - 
                Answer
                06 Feb 2024
                
                                    
                                How to set up a Windows Server 2022 domain controller
While the process to migrate from a legacy domain controller is not difficult, it does require advanced preparation to avoid connectivity issues and other problems. Continue Reading
By - 
                Tutorial
                25 Jan 2024
                
                                    
                                Using Microsoft AD Explorer for common admin tasks
The utility makes it easier to navigate the Active Directory database and features snapshot capabilities with a comparison function to detect where a change caused a problem. Continue Reading
By- Damon Garn, Cogspinner Coaction
 
 - 
                Tip
                22 Jan 2024
                
                                    
                                How to use a Microsoft Entra ID emergency access account
A break-glass account in Microsoft's identity and access management platform helps avoid disruptions in a crisis. Follow these best practices to keep these credentials safe. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tip
                27 Dec 2023
                
                                    
                                How to manage a migration to Microsoft Entra ID
Thinking of leaving Active Directory behind? A successful move to Microsoft's cloud-based identity and access management platform hinges on how well you've prepared in advance. Continue Reading
By - 
                Tip
                27 Dec 2023
                
                                    
                                What are the Microsoft Entra ID benefits for on-prem admins?
Active Directory's presence looms large for organizations that rely on Microsoft's venerable directory service for a multitude of tasks tied to identity and access. Continue Reading
By - 
                Definition
                28 Nov 2023
                
                            
                            privileged identity management (PIM)
Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an organization's IT environments. Continue Reading
By - 
                Definition
                21 Nov 2023
                
                            
                            possession factor
The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token. Continue Reading
By - 
                Tip
                13 Nov 2023
                
                                    
                                What should admins know about Microsoft Entra features?
Microsoft Entra combines new and existing cloud-based products and packages them under a new name. Learn how this change affects identity access management in your organization. Continue Reading
By - 
                Definition
                09 Nov 2023
                
                            
                            mandatory access control (MAC)
Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system. Continue Reading
By - 
                Definition
                18 Oct 2023
                
                            
                            Google Authenticator
Google Authenticator is a mobile security application that provides a second type of confirmation for websites and online services that use two-factor authentication (2FA) to verify a user's identity before granting him or her access to secure resources. Continue Reading
 - 
                Definition
                12 Oct 2023
                
                            
                            Microsoft Windows Credential Guard
Microsoft Credential Guard is a security feature in Microsoft Windows operating system (OS) that isolates user credentials, such as login information, from the rest of the operating system. Continue Reading
By - 
                Definition
                10 Oct 2023
                
                            
                            password entropy
Password entropy is a measurement of a password's strength based on how difficult it would be to crack the password through guessing or a brute-force attack. Continue Reading
 - 
                Definition
                06 Oct 2023
                
                            
                            risk-based authentication (RBA)
Risk-based authentication (RBA) is an authentication method in which varying levels of stringency are applied to a system’s authentication process based on the likelihood that access to that system could result in its compromise. Continue Reading
By - 
                Definition
                23 Aug 2023
                
                            
                            BYOI (bring your own identity)
BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password are managed by a third party. BYOI is increasingly being used for website authentication. Continue Reading
By- Robert Sheldon
 - Sharon Shea, Executive Editor
 
 - 
                Definition
                14 Aug 2023
                
                            
                            Directory Services Restore Mode (DSRM)
Directory Services Restore Mode (DSRM) is a Safe Mode boot option for Windows Server domain controllers. Continue Reading
By - 
                Definition
                31 Jul 2023
                
                            
                            Common Access Card (CAC)
A Common Access Card (CAC) is a smart card issued by the Unites States Department of Defense for accessing DOD systems and facilities. Continue Reading
By - 
                Definition
                09 Jun 2023
                
                            
                            logon (or login)
In computing, a logon is a procedure that enables an entity to access a secure system such as an operating system, application, service, website or other resource. Continue Reading
 - 
                Definition
                11 May 2023
                
                            
                            Active Directory functional levels
Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Definition
                17 Apr 2023
                
                            
                            Microsoft Azure Key Vault
Microsoft Azure Key Vault is a cloud-based security service offered by Microsoft as part of its Azure platform. Continue Reading
By- Katie Terrell Hanna
 - Tayla Holman, Site Editor
 
 - 
                Tutorial
                12 Apr 2023
                
                                    
                                How to create fine-grained password policy in AD
Fine-grained password policies are a simple and effective way of ensuring password settings meet business requirements. Continue Reading
By- Damon Garn, Cogspinner Coaction
 
 - 
                Tutorial
                12 Apr 2023
                
                                    
                                How to enable Active Directory fine-grained password policies
Specifying multiple password policies customized to specific account types adds another layer to an organization's security posture. Using PSOs instead of Group Policy can help. Continue Reading
By- Damon Garn, Cogspinner Coaction
 
 - 
                Tutorial
                17 Mar 2023
                
                                    
                                How to transfer FSMO roles with PowerShell
You might need to shift Active Directory FSMO roles for a few reasons. If you need to do it more than once, there's a way to automate the procedure with PowerShell. Continue Reading
By- Liam Cleary, SharePlicity
 - Adam Bertram
 
 - 
                Tip
                06 Mar 2023
                
                                    
                                How to upload and download files with PowerShell FTP script
By using the .NET WebClient class and PowerShell, Windows admins can upload and download files to FTP. Review the general process and corresponding examples to get started. Continue Reading
 - 
                Tip
                16 Feb 2023
                
                                    
                                How to filter Security log events for signs of trouble
Certain accounts, such as company executives, will draw unwanted attention from hackers. Learn how to catch these targeted attacks by checking Windows event logs. Continue Reading
 - 
                Definition
                08 Dec 2022
                
                            
                            global catalog (Active Directory)
A global catalog is a data storage source containing partial representations of objects found in a multi-domain Active Directory Domain Services forest. Continue Reading
 - 
                Tutorial
                28 Nov 2022
                
                                    
                                How to build an Azure AD user report with Microsoft Graph
Microsoft Graph will be the way forward to manage users and devices that connect to Office 365. Learn how to gather information and perform tasks, such as license assignments. Continue Reading
 - 
                Tutorial
                14 Apr 2022
                
                                    
                                Get started with Azure AD entitlement management automation
Identity governance tasks in Azure Active Directory can be overwhelming, but understanding how to use Microsoft Graph and PowerShell to work with these settings will help. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Definition
                14 Apr 2022
                
                            
                            Microsoft Identity Manager
Microsoft Identity Manager -- also called Microsoft Identity Manager 2016 or MIM -- is an on-premises tool that enables organizations to manage access, users, policies and credentials. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
 - Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Definition
                12 Apr 2022
                
                            
                            Microsoft Windows Update
Microsoft Windows Update is a security service for Windows users that, once activated, automatically searches for and installs updates. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
 - Toni Boger, TechTarget
 
 - 
                Definition
                31 Mar 2022
                
                            
                            authentication server
An authentication server is an application that facilitates the authentication of an entity that attempts to access a network. Continue Reading
 - 
                Tip
                29 Mar 2022
                
                                    
                                Deploy an information barrier policy for Microsoft Teams
Mistakes happen, but can be costly when they involve compliance. Office 365 information barriers can prevent inadvertent sharing to protect the organization's sensitive data. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
 
 - 
                Tutorial
                01 Mar 2022
                
                                    
                                Learn to adjust the AdminCount attribute in protected accounts
It's critical to know how to change the settings for protected accounts and groups in Active Directory to avoid serious problems. PowerShell can make quick edits to keep order. Continue Reading
By- Mike Kanakos, Align Technology
 
 - 
                Definition
                25 Feb 2022
                
                            
                            passphrase
A passphrase is a sentencelike string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack. Continue Reading
By- Andrew Froehlich, West Gate Networks
 - Laura Fitzgibbons
 
 - 
                Tutorial
                17 Feb 2022
                
                                    
                                Build your knowledge of Azure AD conditional access policies
The rapid pace of change in the modern workplace requires new methods to control who has access to what. This Azure Active Directory feature can help IT meet those security goals. Continue Reading
By- Mike Kanakos, Align Technology
 
 - 
                Tutorial
                20 Dec 2021
                
                                    
                                How to perform Azure AD bulk operations with PowerShell
Microsoft offers multiple ways to manage users and groups in Azure Active Directory. PowerShell is one option, but it requires knowing which module to use to handle coverage gaps. Continue Reading
By- Mike Kanakos, Align Technology
 
 - 
                Tutorial
                10 Dec 2021
                
                                    
                                Microsoft Teams lifecycle management with PowerShell and Graph
A rushed Microsoft Teams deployment could lead to unintended gaps in security and governance. Here's how to use PowerShell and the Microsoft Graph to regain control. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tip
                06 Dec 2021
                
                                    
                                Why you should plan to upgrade to Azure AD Connect v2 soon
Administrators who rely on an Azure AD Connect v1 version for hybrid identity with Office 365 should prepare for the impending retirement of several technologies in the utility. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
 
 - 
                Tutorial
                21 Sep 2021
                
                                    
                                Working with the Microsoft Defender for Identity portal
The security product, formerly Azure Advanced Threat Protection, taps into the cloud to uncover suspicious activity across the on-premises network. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tip
                24 Aug 2021
                
                                    
                                Boost security with Office 365 privileged access management
Understand how to thwart cyber attacks on privileged user accounts on Microsoft's collaboration platform to avoid becoming that next security breach statistic. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
 
 - 
                Definition
                30 Jul 2021
                
                            
                            Active Directory Domain Services (AD DS)
Active Directory Domain Services (AD DS) is a server role in Active Directory that allows admins to manage and store information about resources from a network, as well as application data, in a distributed database. Continue Reading
By- Ben Lutkevich, Site Editor
 - Toni Boger, TechTarget
 
 - 
                Tip
                22 Jun 2021
                
                                    
                                Get a grasp on using group managed service accounts
When you create a group managed service account, it relieves some administrative duties and bolsters the security related to passwords for services in a Windows environment. Continue Reading
By - 
                Tip
                13 Apr 2021
                
                                    
                                Azure MFA NPS extension boosts authentication capabilities
With help from the Network Policy Server extension, organizations can expand their on-premises authentication features by tapping into Microsoft's cloud. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Tip
                26 Mar 2021
                
                                    
                                Stay in control with Azure AD Privileged Identity Management
Rampant use of elevated privileges can prove hazardous to enterprises. Rein in access and manage resource access with help from this Azure Active Directory feature. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
 
 - 
                Tutorial
                26 Feb 2021
                
                                    
                                Learn to use a PowerShell call function from another script
Don't use the same lines of code in several places in your scripts. Learn how to use functions and reap the benefits of a more streamlined approach. Continue Reading
 - 
                Tip
                22 Dec 2020
                
                                    
                                Azure AD Premium P1 vs. P2: Which is right for you?
Azure Active Directory is more than just Active Directory in the cloud. See how the premium editions of the directory service stack up to find the best fit for your organization. Continue Reading
By - 
                Tip
                17 Nov 2020
                
                                    
                                Explore the benefits of Azure AD vs. on-prem AD
A move to Office 365 doesn't require cutting the cord from on-premises Active Directory, but it is an option. Here's what you need to know when comparing Azure AD vs. on-prem AD. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
 
 - 
                Feature
                31 Aug 2020
                
                                    
                                Securing Active Directory also involves good backup practices
The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack. Continue Reading
By- Tom Walat, Site Editor
 - Packt Publishing
 
 - 
                Tip
                07 Aug 2020
                
                                    
                                Techniques to troubleshoot Active Directory issues
Active Directory runs several key operational duties, such as validating access to resources. Keep the system from breaking down with help from these diagnostic methods. Continue Reading
By - 
                Tip
                08 Jul 2020
                
                                    
                                Active Directory replication troubleshooting tips and tools
When replication between domain controllers breaks down, just about everything else will grind to a halt. These utilities can help pinpoint the Active Directory issues. Continue Reading
By - 
                Tutorial
                04 May 2020
                
                                    
                                Find and lock down lax Windows share permissions
With help from PowerShell, you can identify the shares that need adjustments across your infrastructure then use a script to fix them to protect sensitive data. Continue Reading
By - 
                Opinion
                27 Apr 2020
                
                                    
                                Remote access is just one of many COVID-19 IT challenges
The coronavirus outbreak stretched many in IT to the limit of their abilities to find ways to accommodate the surge in remote workers. Continue Reading
By- Tom Walat, Site Editor
 
 - 
                Tip
                08 Apr 2020
                
                                    
                                Active Directory nesting groups strategy and implementation
Does your current Active Directory permissions setup spark joy? If not, then it's time to unscramble that confusing design into something that's easier to use and maintain. Continue Reading
By - 
                Tip
                19 Feb 2020
                
                                    
                                How to fortify your virtualized Active Directory design
It takes a little work to fine-tune your Active Directory deployment, but the benefits will result in little to no service interruptions to your users if an outage occurs. Continue Reading
By- Brian Kirsch, Milwaukee Area Technical College
 
 - 
                Tip
                27 Jan 2020
                
                                    
                                Using Azure AD conditional access for tighter security
The cloud-based identity and access management service does not come with certain defensive features turned on by default, which administrators should rectify. Continue Reading
By - 
                Feature
                23 Dec 2019
                
                                    
                                PowerShell tutorials capture attention of admins in 2019
Interest in automation continues to trend upward for administrators of Windows systems, particularly when it involves PowerShell. Continue Reading
By- Tom Walat, Site Editor
 
 - 
                Tutorial
                17 Dec 2019
                
                                    
                                Get back on the mend with Active Directory recovery methods
Administrators should have a few of these data protection techniques up their sleeves to keep Active Directory from a total breakdown. Continue Reading
By- Richard Siddaway, Independent consultant
 
 - 
                Tutorial
                27 Sep 2019
                
                                    
                                Implement automated employee onboarding with PowerShell
Your time is precious and you shouldn't waste it by clicking through menus to set up a new user. Look at these code examples to put together your own provisioning script. Continue Reading
By - 
                Tip
                25 Sep 2019
                
                                    
                                How to rebuild the SYSVOL tree using DFSR
Active Directory is the key component in many organizations to keep tabs on access and identity. If the SYSVOL directory disappears, these steps can get the system fixed. Continue Reading
By- Richard Siddaway, Independent consultant
 
 - 
                Tip
                19 Jul 2019
                
                                    
                                Construct a solid Active Directory password policy
Most user authentication still relies on a strong password to keep attackers at bay. Here's how to keep your guard up without adding to your administrative workload. Continue Reading
By - 
                Tip
                24 Jun 2019
                
                                    
                                How to locate privileged accounts in Active Directory
IT administrators must be able to identify privileged accounts in Active Directory for a more secure enterprise; two methods can make the task easier. Continue Reading
By - 
                Tutorial
                26 Feb 2019
                
                                    
                                Set up users with key PowerShell Active Directory commands
User management in Active Directory doesn't have to fill you with click-induced anxiety. Try these PowerShell tips for a more efficient way to get this work done. Continue Reading
By- Richard Siddaway, Independent consultant
 
 - 
                News
                12 Feb 2019
                
                                    
                                Microsoft zero-day vulnerability closed on Patch Tuesday
Administrators should prioritize patching systems affected by a zero-day vulnerability resolved by the February Patch Tuesday updates. Continue Reading
 - 
                Answer
                12 Feb 2019
                
                                    
                                What key SDN features are in Windows Server 2019?
Microsoft SDN capabilities got a boost in Windows Server 2019 to wrap more security around VMs and make networking tasks less painful to execute. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Tutorial
                25 Jan 2019
                
                                    
                                How to configure SSL on IIS with PowerShell
SSL encryption is a necessary component when building an IIS website that communicates with the outside world. Use this PowerShell tutorial to streamline the deployment process. Continue Reading
By - 
                Answer
                15 Jan 2019
                
                                    
                                How does Azure Update Management handle integration?
Azure Update Management works with other Microsoft administrative tools to give IT pros a more complete offering to patch operating systems. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Tip
                14 Jan 2019
                
                                    
                                How to set up and enforce Azure multifactor authentication
Azure Active Directory offers multifactor authentication to further secure login credentials. Get started with these instructions to set up this Microsoft cloud service. Continue Reading
By - 
                News
                08 Jan 2019
                
                                    
                                Light January Patch Tuesday follows IE out-of-band security update
Administrators should prioritize an out-of-band patch that addresses an Internet Explorer zero-day before tackling the 47 vulnerabilities corrected by the January Patch Tuesday fixes. Continue Reading
 - 
                Tip
                30 Nov 2018
                
                                    
                                Stay in control with these Active Directory basics
Administrators have an ever-increasing number of resources to handle and permissions to track, but they can cut this seemingly impossible task down to size with Active Directory. Continue Reading
 - 
                Tip
                16 Nov 2018
                
                                    
                                Understanding what Azure AD federation really means
A company that adopts SaaS apps to get work done can ease the transition by implementing a single sign-on method. Learn how to set up this arrangement in a secure manner. Continue Reading
By - 
                Quiz
                17 Oct 2018
                
                                    
                                Can this Active Directory quiz stump you?
How much do you know about Active Directory? Find out with this Active Directory quiz on the service's basics, structure and capabilities. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Tutorial
                10 Oct 2018
                
                                    
                                How to manage Active Directory groups with 7 PowerShell commands
Managing users, devices and other resources with Active Directory doesn't always require a GUI tool. Try PowerShell to streamline some of your administrative workload. Continue Reading
By- Richard Siddaway, Independent consultant
 
 - 
                Answer
                06 Sep 2018
                
                                    
                                How does AD DS differ from Microsoft Azure Active Directory?
On-premises Active Directory or Azure AD? It doesn't have to be an either/or situation, as more cloud services are making their way into traditional data center environments. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Answer
                21 Aug 2018
                
                                    
                                Understand Active Directory basics for enterprise success
You can't get the most out of a tool unless you understand its features. This tip explains the basics of Active Directory and how it controls access and maintains order. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Tip
                13 Jun 2018
                
                                    
                                Organize Active Directory with these strategies
Administrators tasked with cleaning up the Active Directory user group structure need not search any further. Use these tips to avoid Active Directory maintenance headaches. Continue Reading
By