Control granular permissions for servers and clients via Active Directory—with group policies and PowerShell!
Lesedauer 6 MinutenLocal Active Directory infrastructures remain widespread and are therefore a popular target for attackers. To effectively reduce the attack surface and harden the infrastructure against attacks, numerous guides and articles are now available. Broadly speaking, the recommendations can be divided into the following topics: Topic Empfehlung(en) Zero Trust - No system or user is automatically […]
Connect an application with custom attributes to Entra ID - that's how it works!
Lesedauer 6 MinutenActive Directory remains the primary authentication and authorization platform for many companies. However, it is now somewhat outdated. For example, third-party solutions are required to add MFA functions. In addition, modern alternatives are available that add many more features in terms of convenience and security. Microsoft is clearly positioning Entra ID as the successor to […]


