Resources

Blog

Downtime Is Dangerous: Why Identity Resilience is Now Mission-Critical for Healthcare

Beyond Access: How Healthcare IT Can Cut Costs, Shrink Attack Surfaces, and Protect Patient Data with Smart Automation

In healthcare, behind every login is a nurse, a physician, and—most importantly—a patient in need. When identity systems fail, care delivery comes to a halt. That reality has been underscored by recent breaches, where stolen credentials, dormant admin accounts, and lateral movement across hybrid systems have caused not just IT outages, but also treatment delays, patient diversions, and canceled surgeries.

Read More »

Protecting Active Directory Against Pass-the-Hash Attacks

TL;DR Pass-the-Hash attacks allow cybercriminals to steal hashed credentials and impersonate legitimate users in Active Directory environments without ever knowing actual passwords, enabling them to move laterally through networks and escalate privileges. This article explains how Pass-the-Hash exploits work, how to detect suspicious activity, and provides essential strategies to protect

Read More »
Cayosoft joins the Microsoft Intelligent Security Association

Enhanced Windows LAPS Password View and Management

Introduction  In our commitment to provide robust Active Directory, Entra ID, and M365 security, monitoring, and recovery Cayosoft Guardian is rolling out new features designed to make your security processes more streamlined and secure. With the latest update, we’re introducing modern LAPS management capabilities directly in the product.  Feature Highlights 

Read More »

Enhanced Security and Deployment with gMSA and AD Connector

In our commitment to provide robust Active Directory, Entra ID, and M365 security, monitoring, and recovery Cayosoft Guardian is rolling out new features designed to make your security processes more streamlined and secure. With the latest update, we’re introducing Group Managed Service Account (gMSA) integration and the AD Connector feature,

Read More »

Active Directory Security Best Practices: Key NSA Guidelines

Most global businesses run hybrid AD environments, and following active directory security best practices is critical when combining on-premises and cloud services to secure both Active Directory (AD) and Microsoft Entra ID (formerly Azure AD). Both systems manage identity and access control, making them prime targets for attackers aiming to

Read More »

K-12 Ransomware Protection: Securing Schools’ AD & Entra ID

As K-12 schools increasingly rely on digital services and key infrastructure such as Active Directory and Entra ID for authentication and access to support education services. We continue to see an increase with being targeted by Ransomware groups and falling victim to ransomware attacks, putting sensitive data and education services

Read More »

How to Protect Active Directory from a Kerberoasting Attack

Active Directory (AD) is the beating heart of many organizations’ IT infrastructures, managing user accounts, permissions, and access to critical resources. However, beneath its seemingly impenetrable exterior lies a vulnerability that attackers are increasingly exploiting: the Kerberoasting attack. Let’s take a look at this threat, understand its mechanics, and uncover

Read More »

Qilin Ransomware: How to Detect & Protect Against This Exploit

Qilin ransomware has emerged as a significant threat to organizations, particularly those relying heavily on Active Directory for managing their IT infrastructure. Qilin ransomware has adopted a new method for stealing credentials from Google Chrome browsers by leveraging Active Directory Group Policy. In this guide, we will explore how Qilin

Read More »

FSMO Roles: The Hidden Key to Resilient Active Directory

At the heart of every well-functioning Active Directory (AD) environment lies a set of unsung heroes: Flexible Single Master Operation (FSMO) roles. These specialized roles hold the keys to your AD’s resilience, stability, and recoverability. While they may not be the most glamorous aspect of AD management, understanding and safeguarding

Read More »

Golden Ticket Attack: How To Protect Your Active Directory

Among all cybersecurity threats, only a few attacks are as insidious and potentially damaging as the Golden Ticket attack. Unlike ransomware or brute-force hacking, which often leave visible traces, the Golden Ticket attack operates under the radar, giving hackers a secret passage into the heart of a company’s most valuable

Read More »

Mastering Microsoft 365 Governance: Active Directory Guide

In most Microsoft 365 environments, Active Directory (AD) is a key component for managing user identities and access, controlling who accesses what and how. However, as your organization grows, so do the complexities and risks associated with AD management. An improperly managed AD setup can lead to devastating security breaches,

Read More »

Forest Recovery in Active Directory: Are You Prepared?

Active Directory (AD) is the backbone of most enterprise IT environments, serving as the central repository for user identities, access permissions, and system configurations. As organizations grow and evolve, their AD infrastructures often expand into multiple domains within a single forest, and/or multiple forests with multiple domains, creating a complex

Read More »

Managing Active Directory in a Zero Trust World

Applying a Zero Trust strategy to Active Directory management reduces your identity threat landscape, enhances access controls and segmentation, enforces just-in-time access, and improves monitoring and incident response. Overall, this approach strengthens your identity platform and makes it more resilient. In this blog, learn how Zero Trust strategy and principles

Read More »

What is Mimikatz? A Security Guide for Organizations

Imagine a cyberattack that doesn’t rely on brute force or zero-day exploits, instead silently slipping past your defenses and targeting the very heart of your network security: user credentials. This is the reality of Mimikatz, a post-exploitation tool that has become a favorite weapon among cybercriminals. What Is Mimikatz? It’s

Read More »

NTLM Relay Attack Prevention: A Checklist for Active Directory Security

NT LAN Manager (NTLM) relay attacks represent a persistent threat to organizations that rely on Active Directory (AD) for identity management and access control. These attacks exploit weaknesses in the NTLM authentication protocol, allowing attackers to impersonate legitimate users and gain unauthorized access to sensitive resources within the AD environment.

Read More »

Securing Active Directory Against DCSync Attacks

DCSync attacks remain a persistent threat to Active Directory (AD) security. These attacks cleverly exploit normal AD replication processes, allowing hackers to secretly extract sensitive password hashes. This access can pave the way for widespread exploits across your network. Given the prevalence of DCSync attacks, IT professionals must be equipped

Read More »

Cayosoft-Enhanced Defense: Securing Active Directory in 2024

Active Directory (AD) remains a backbone of IT systems for many organizations, managing access and permissions for users and devices. But its frequent use made it a top target for cyberattacks. Attackers are getting smarter, finding ways to misuse AD’s features to gain control, spread through networks, and steal valuable

Read More »

Surviving LockBit: How to Protect Your Organization

LockBit ransomware attacks are on the rise and pose a major threat to organizations of all sizes. In 2022 alone, LockBit is estimated to have been responsible for 44% of all known incidents. This ransomware’s primary goal is to quickly gain full control of an environment to demand money from

Read More »

Active Directory Best Practices for Management in 2024

In 2024, effective Active Directory (AD) management is more critical than ever. With escalating cyber threats and complex network environments, businesses must prioritize keeping their AD secure and streamlined. The shift towards automation and security-focused strategies aligned with Active Directory best practices is essential. Here’s the alarming fact: 82% of

Read More »

Top 4 Security Measures Against Silver Ticket Attacks

Silver Ticket Attacks | Protecting Your Active Directory From Cyber Threats Silver ticket attacks are a type of cyberattack that exploits weaknesses in the Kerberos authentication protocol, which is used for secure logins within Active Directory (AD). By stealing a service account’s login information, attackers can create fake access passes

Read More »

Securing SYSVOL: Threats, Protection, and Recovery

What is SYSVOL and Why is it Important? For many IT professionals, the system volume (SYSVOL) might seem like just another shared folder. However, if not properly protected, it represents a critical security vulnerability within every Active Directory domain controller. SYSVOL stores the essential files and scripts that govern user

Read More »

Active Directory Software: Top 7 Enterprise Requirements

Understanding the Complexities of Enterprise IT Security The Microsoft Digital Defense Report reveals a concerning trend: 93% of Microsoft’s ransomware incident response engagements uncovered insufficient controls on privilege access and lateral movement. This illustrates that companies need to strengthen their user management and security in 2024. The growing trend underlines

Read More »

Active Directory Authentication Explained

Getting Smart with Active Directory Authentication Let’s talk about Active Directory authentication, a key player in your IT environment’s security. In simple terms, it’s like the main gatekeeper of your organization’s IT environment, deciding who gets in and what they can do. This isn’t just about keeping bad guys out,

Read More »

Active Directory Cleanup: Top 8 Best Practices

Top Best Practices for Optimal Performance | Active Directory Cleanup Active Directory plays a key role in IT infrastructure, managing user identities and protecting network resources. However, it can often collect excess data, creating what we can call digital clutter. An organized approach to cleaning up Active Directory is crucial

Read More »

Active Directory Schema: Essentials & Backup Strategy

Understanding Active Directory Schema Before we dive into the backup, let’s clear up what an Active Directory schema is. Simply put, the Active Directory schema is a set of definitions that outline what kinds of objects and information about those objects can be stored in Active Directory. Think of it

Read More »

Why You Need to Recover Active Directory Forest

Essential Considerations to Recover Your Active Directory Forest Active Directory isn’t just a part of your IT infrastructure, it’s the forgotten central hub that keeps everything running smoothly. But with great power comes great responsibility – and vulnerability. It’s a primary target for attackers and any disruption will send ripple

Read More »

Enhancing IT Agility with Automated User Provisioning in Active Directory

Understanding Automated User Provisioning in Active Directory In the world of IT, manual management of user provisioning and deprovisioning feels as outdated as a floppy disk. Just imagine trying to juggle countless user profiles across diverse on-premise and cloud environments—it’s a logistical nightmare. Enter the era of automated user provisioning

Read More »

Selecting the Right Tools to Manage Active Directory in 2024

How to Choose the Best Tools to Manage Active Directory In the changing world of IT management, choosing the right tools to manage Active Directory is very important. Active Directory is the main system for managing identities and access in your organization. It needs a strong solution that simplifies operations,

Read More »

Is it Time for your Microsoft Enterprise Agreement Renewal?

Resources to Optimize Microsoft 365 (Formerly Office 365) License Management and Reduce Costs For organizations with 500 or more users or devices, that want a more manageable volume licensing program, the Microsoft Enterprise Agreement (EA) provides the ability to buy cloud services and software licenses under one agreement. These enterprise agreements are

Read More »
Microsoft Whiteboard Release Coming Soon

Microsoft Whiteboard Release Coming Soon

Microsoft Whiteboard, a Creative Canvas –  Back in December, Microsoft Whiteboard released into preview. The digital equivalent of, well, a whiteboard, the app was designed to scratch the itch of creative planners looking for a free-form brainstorming and design tool. Unlike a physical whiteboard, however, the app’s boards have no

Read More »
Top 10 Current and Upcoming Outlook Updates

Top 10 Current and Upcoming Outlook Updates

A truckload of new Outlook updates are steadily rolling toward users on every platform from Android to Windows. Here’s the rundown on the ten most noteworthy of these changes, available in Outlook now or within the next few months, ranked accordingly: 1 – Bcc Warning You’ll be alerted you if

Read More »
Play Well with Others with Azure AD B2B Collaboration

Play Well with Others with Azure AD B2B Collaboration

The Sign Reads “No Jerks (or Competitors) Allowed” – Over at Petri, Tony Redmond has been keeping an eye on Azure Active Directory’s business-to-business (B2B) collaboration feature. If you haven’t run across it before, Azure AD B2B collaboration allows guests from other (potentially not-running-Azure) organizations to work safely with your users

Read More »
Productivity, Security, Accessibility in New Windows 10 Update

Productivity, Security, Accessibility in New Windows 10 Update

The new Windows 10 update is rolling out now, and there are plenty of handy features and changes included. Here are the productivity, security, and accessibility highlights from Microsoft’s announcement.  Productivity Think of the new Timeline feature as a browser history, expanded to track all user activities on all their devices. It’s

Read More »
What's an On-Premise Data Gateway? - Hybrid Tech Tips

What’s an On-Premises Data Gateway? – Hybrid Tech Tips

Right Out of the Gate –  Shane Young at Petri recently brought up the existence of Microsoft’s on-premises data gateway, an oft-forgotten but handy tool for hybrid data management. Today in Hybrid Tips & Tricks, we’ll be discussing this easy-to-set-up, (almost) free Microsoft tool.  The on-premises data gateway is a pipeline from on-premises data stores to cloud stores, apps,

Read More »
April Showers Bring SharePoint Updates

April Showers Bring SharePoint Updates

This month so far has been good for SharePoint updates—and there are plenty more still to come. Here’s the rundown.  The News is New News  –  For those tenants receiving test updates, it’s now possible to create news pages in SharePoint. These pages can then be integrated into Teams as a tab (as can normal SharePoint pages) or emailed as

Read More »
FREE WEBINAR: Automate Office 365 Common Admin Tasks

FREE WEBINAR: Automate Office 365 Common Admin Tasks

Join us for this online event and learn how to eliminate complex scripting and automate many Office 365 admin tasks. Cayosoft will demonstrate how to easily automate ongoing policy enforcement, group membership management and the deprovisioning of Office 365 user accounts. The discussion will cover both hybrid and non-hybrid tasks

Read More »
Data Retention Policies for Teams Now Available

Data Retention Policies for Teams Now Available

Teams Cleans Data Seams –  In data retention, a delicate balance must be kept. On the one hand is the need to delete older data to proactively mitigate damaging security breaches or litigation. Additionally, it’s important to clear data clutter for users, to help ensure they have only the information they need. On the other hand are pressures

Read More »
Legitimate Office 365 Emails in Junk Folders: Tech Tales from the Tiki Bar

Legitimate Office 365 Emails in Junk Folders

Straight to Trash –  If you’ve seen a rise in legitimate emails in junk folders recently, you’re not the only one.   The culprit? A new anti-spoofing update for Office 365 Advanced Threat Protection (ATP). I’ve found a great post from Paul Cunningham at Practical365 discussing this change and its implications, so check it out for the details.

Read More »
Happy Birthday to Teams: More Features at No Cost?

Happy Birthday to Teams: More Features at No Cost?

They Grow Up So Fast Microsoft Teams was released almost exactly a year ago, and Microsoft has been pushing it hard to compete against Slack and other communications tools ever since. The sheer magnitude of Teams updates, both large and small, is remarkable—a quick glimpse of the Microsoft Roadmap shows roughly 45 fully released updates and 60 more currently in development. Considering the latter is roughly a third of the updates in development for all of

Read More »
Security Intelligence Report Reveals Global Threat Trends

Security Intelligence Report Reveals Global Threat Trends

Growing Threats Microsoft’s 23rd volume of its annual Security Intelligence Report is now available for download. The report’s conclusions are based on the analysis of threat trends over the past year in both on-premise and cloud services, drawing from hundreds of thousands of attacks on over a billion devices. The release announcement highlights several prominent attack types.  Malware propagating through massive botnets continues to infect millions

Read More »
Don't Get Hosed by Password Spray Attacks

Don’t Get Hosed by Password Spray Attacks

What’s a Password Spray Attack? A password spray doesn’t look like a traditional attempt to brute force an individual’s password. Instead, attackers go wide, attempting a login for as many users as possible using an (unfortunately) very common password like “P@$$w0rd” or “123456.”   It neatly circumvents most detection techniques—after all, from the

Read More »
Enabled vs Enforced MFA

MFA Enabled vs Enforced – What’s the Difference?

Last Updated On: Understanding Office 365 Multi-Factor Authentication Enabled vs. Enforced One of the top ways Microsoft recommends to secure your Active Directory and Office 365 is by setting up multi-factor authentication (MFA). Passwords remain the most popular form of verifying a user’s identity but are highly vulnerable to cyberattacks,

Read More »
Attack Simulator for Office 365 Lets You Play the Hacker

Attack Simulator for Office 365 Lets You Play the Hacker

Tackling Security from Another Angle If you’ve ever wanted to throw digital darts at your end users in the name of good security, the time is now. Now in public preview, the Attack Simulator for Office 365 Threat Intelligence is designed to be a more direct tool for threat prevention.  As the name implies, the

Read More »