Articles By: Quest

Exchange Server Exploits: How to Spot and Stop Vulnerabilities Resulting From HAFNIUM Attacks

True, false or maybe? • If you use Exchange Online, then HAFNIUM and the Exchange Server exploit do not affect you.• The most likely consequence of the exploit is credential dumping.• If you’ve been attacked through the exploit, the best practice is to rebuild Active Directory. Attacks against multiple vulnerabilities in Exchange Server have left system administrators like you scrambling […]

Read more ›

Nine Best Practices to Improve Active Directory Security and Cyber Resilience

A little digging into the many recent, headline-grabbing data breaches reveals one common thread: It was often a lapse in internal security that enabled the attack to succeed, despite robust external security. Employees can use their access permissions to steal your data deliberately or put it in danger accidentally, and stolen credentials and weak passwords turn outside attackers into insiders […]

Read more ›

Be Prepared for Ransomware Attacks With Active Directory Disaster Recovery Planning

Ransomware attacks are skyrocketing. Are you prepared? Since Active Directory provides authentication and authorization services for users and critical applications, a solid Active Directory recovery plan must be at the core of every ransomware defense strategy. Indeed, as one Gartner analyst notes, “The restore process from many well-documented ransomware attacks has been hindered by not having an intact Active Directory […]

Read more ›

Preparing for Attacks that Seek Total Annihilation

Defending your IT infrastructure against attack has never been a simple task. But things have taken a decidedly ugly turn of late: More and more attacks are simply seeking the total annihilation of your infrastructure. Any organization can be a target – or simply collateral damage from an attack targeting someone else. Sadly, many organizations are simply unprepared, and as […]

Read more ›

Top 10 Active Directory Security Reports and Alerts You Need

The statistics are staggering: 95M Active Directory accounts are attacked every day and 1.2M Azure AD accounts are compromised each month. On top of that, malicious insiders are eagerly looking for data to steal, and stressed-out workers and admins are making careless mistakes. You simply can’t afford to spend hours scouring AD audit logs and taking the very real risk […]

Read more ›

Top Seven Reports for Supporting a Growing Virtual Workforce

IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go digging through them to find what you need. Good news: With Quest […]

Read more ›

State & Local Government Agencies – Prepare for Total Annihilation Attacks

Cybercriminals see your agency as an attractive target because of the sensitive personal data you store — including Social Security and driver’s license numbers, credit card information, and police reports. But defending your Microsoft Active Directory against attack has never been a simple task. Ransomware seeking the total annihilation of state and local governments’ IT infrastructures has increased in frequency […]

Read more ›

State and Local Government Agencies’ SharePoint Migration Planning Guide

Microsoft SharePoint and Office 365 migration projects are inherently complicated and risky – and this goes double for state and local government agencies. Your SharePoint environment is critical to the productivity of your agency, but consolidating and migrating the legacy infrastructure is a daunting task given your resource and budget constraints. So how can you ensure a successful SharePoint content […]

Read more ›