Azure Active DirectoryAzure AD Management

How to resend Azure AD invitation to guest user?

Why does an organization need guest users In today’s digital landscape, organizations often collaborate with external businesses, providing access to certain resources or services within the organization’s digital ecosystem is essential for collaboration and facilitating workflows. Guest users enable seamless collaboration while maintaining security and control over important…
Read more
Azure Active DirectoryAzure AD Management

Master Azure AD automation with Microsoft Graph PowerShell

For Active Directory (AD) administrators, using native AD tools for recurring tasks can be time-consuming. PowerShell is a scripting language built into Windows, that can tackle this issue by automating repetitive tasks. While Azure AD PowerShell has been a reliable tool for managing Azure AD, there is now a need for a shift towards Microsoft Graph PowerShell. This article provides a brief intro…
Read more
Azure Active DirectoryAzure AD Management

Elevate access for Azure subscriptions and group management

As organizations expand their Azure active directory (AD) usage, managing multiple subscriptions and organizing resources across various departments or projects becomes increasingly complex. To streamline this process and ensure effective governance, Azure offers a feature called “Elevate access,” which allows users to manage all subscriptions centrally and management groups. This…
Read more
Active Directory Policies

Block windows app installation with elevated privileges using GPO

In an enterprise IT environment, controlling the permissions and actions of the Windows Installer is crucial for maintaining security and consistency. Allowing the Windows Installer to use elevated permissions during program installations can lead to unexpected changes and potential security vulnerabilities. In this article, we will guide system administrators through the process of creating a…
Read more
Active Directory Policies

GPO to prevent regular users from changing MSI installation options

In a managed IT environment, ensuring the consistency and security of software installations is essential. Allowing regular users to change installation options during the installation of an MSI package can lead to configuration discrepancies and potential security risks. In this article, we will walk through the process of creating a Group Policy Object (GPO) to deny regular users the ability to…
Read more
Active Directory Policies

GPO to prevent autoplay on non-volume devices

Autoplay is a feature in Windows that automatically executes a predefined action when a new device, such as a USB drive, camera, or phone, is connected to the system. While convenient, it can pose a security risk, particularly in an enterprise environment, as it can lead to the automatic execution of malicious software. This article provides a detailed guide for system administrators on creating a…
Read more
Active Directory Policies

Prevent remote logon for local accounts with blank password - GPO

In the realm of network security, one critical aspect is ensuring that all accounts, especially those with remote logon capabilities, are secured with strong passwords. Allowing remote logon for local accounts with blank passwords can pose a significant security risk. This article provides a step-by-step guide for system administrators on how to create a Group Policy Object (GPO) to deny remote…
Read more
Active Directory Policies

How to deny anonymous enumeration of SAM accounts using GPO

For system administrators, safeguarding sensitive account information within the Windows environment is crucial. One important aspect of this is preventing the anonymous enumeration of Security Account Manager (SAM) accounts. Unauthorized enumeration of SAM accounts can be a significant security vulnerability, as it may allow attackers to gain information about user accounts and potentially…
Read more
Active Directory Policies

Restrict anonymous access to Shares and Named pipes via GPO

In networked environments, especially in enterprise settings, securing communication channels and shared resources is crucial for maintaining data integrity and privacy. A critical aspect of this security is to prevent anonymous enumeration of Named Pipes and Shares, which can be exploited by unauthorized users to gain sensitive information about network resources. This article provides a…
Read more
Active Directory Policies

GPO to prevent sending unencrypted passwords to Third-Party SMB Servers

In a networked environment, especially in enterprise settings, safeguarding sensitive data, including passwords, is a critical aspect of cybersecurity. One significant risk is the transmission of unencrypted passwords to third-party Server Message Block (SMB) servers. This article provides a detailed guide for system administrators on creating a Group Policy Object (GPO) to prevent the sending of…
Read more