SlideShare a Scribd company logo
The “Other” 5 Things
        You Should Care About in AD
                         Dial In: +1 (213) 289-0020
                         Access Code: 400-839-152
                       Or use your computer speakers




     Greg Shields, MVP                                 Nick Cavalancia
Partner and Principal Technologist               VP, Windows Management
www.ConcentratedTech.com                                 ScriptLogic
About the Speakers
       Greg Shields
       Greg is a Senior Partner and Principal Technologist with Concentrated
       Technology. He is a Contributing Editor for TechNet Magazine and Redmond
       Magazine, and a Series Editor for Realtime Publishers. Greg is a sought-after and top-
       ranked speaker, seen regularly at conferences like TechMentor, Tech Ed, VMworld,
       and more. He is a multiple recipient of Microsoft "Most Valuable Professional" award
       with has received VMware's vExpert award.




       Nick Cavalancia
       Nick Cavalancia, MCSE/MCT/MCNE/MCNI, is ScriptLogic’s VP of Windows
       Management where he assists in driving innovation and the evangelism of
       ScriptLogic solutions. He has over 17 years of enterprise IT experience and is an
       accomplished consultant, trainer, speaker, columnist and author. He has authored,
       co-authored and contributed to over a dozen books on Windows, Active Directory,
       Exchange and other Microsoft technologies.
About ScriptLogic
• Founded in 2000
• Focus on 4 key areas:
   •   Desktop Management
   •   Help Desk Management
   •   Active Directory Management
   •   Server Management
• Customer Base
   • 30,800+ customers worldwide
   • From SMB to Fortune 100
• Headquartered in Boca Raton, Florida
• Subsidiary of Quest Software since 2007
Daily AD Management
• It’s not just creating users and resetting
  passwords
• There are six areas of AD management
  • Security           • Accounts
  • Auditing           • Recovery
  • Group Policies     • Health
• Let’s look at what’s free and what
  ScriptLogic offers
Active Administrator
• The single solution for AD management
  •   Secure
  •   Audit
  •   Manage
  •   Maintain
  •   Prevent
Focus 1: Security
• Implementing security isn’t enough
  • Everyone’s creating groups, assigning rights, etc.
  • The establishing of a security standard alone isn’t
    enough.
  • You need a process that follows the security
    lifecycle to ensure AD is locked down properly
• Assess, Assign, Audit… repeat
Security– What’s Free?
• Plenty of power in PowerShell
• Free AD cmdlets from Quest Software
  •   Get-QADPermission
  •   Add-QADPermission
  •   Remove-QADPermission
  •   And more!


                                http://bit.ly/1EAVF0
What else is Free?
• Native Tools
  • Nothing for Searching
  • Delegation Wizard
Security - What’s Lacking?
• Requires potentially complex scripting
• Minimal management granularity
• No documenting what’s in place
What Does ScriptLogic Offer?
•   Security-Centric Interface
•   Simplified Security Assessment
•   Consistent Permissions Delegation
•   Automated Delegation Enforcement



    DEMO!
Focus 2: Auditing
• It’s one thing to know who has rights
• It’s something entirely different to know
  • What they’re doing with those rights
  • What was changed
  • What the change value is
Auditing – What’s Free?
• Native Windows Auditing
  • Enable
  • Configure
  • Per-Server



  • Find the Needle!

                            http://bit.ly/8n92Os
Native Auditing – What’s Lacking?
• Decentralized
• Involved searches
• No reporting
What Does ScriptLogic Offer?
• Centralized, Automated, Simplified
  • Auditing
  • Alerting
  • Actions



 DEMO!
Focus 3: Group Policies
• GPO management is a balanced mix of
  security, settings and strategy
  • There are over 3000 Group Policies with the
    release of Windows 7
  • “With great power comes great
    responsibility”
  • Complex mix of layered policies requires
    some attention to ensure the proper
    outcome for the user
GPOs – What’s Free?
• GPMC of course
  •   Delegation
  •   Management
  •   Basic Modeling
  •   Result Reporting


• Worth mentioning - AGPM with MDOP
                             http://bit.ly/r6n90x
GPOs – What’s Lacking?
• Ability to make changes without
  impacting production
• Quickly fixing changes that impact
  production
What Does ScriptLogic Offer?
• GPO History
• Offline Editing
• Advanced GPO Modeling




 DEMO!
Focus 4: Accounts
• Let’s look beyond managing users & groups
• What about…
  • Password Policies that impact users?
  • Inactive Accounts?
  • Expired Passwords?
Accounts – What’s Free?
• Inactive Accounts – ADUC
   http://bit.ly/mY5B5T

• Password Policies – ADUC
• Expired Passwords – PowerShell
   get-aduser -filter {Enabled -eq $True} -properties passwordExpired | where {$_.passwordExpired}

   http://bit.ly/ow82tP
Accounts – What’s Lacking?
• Inactive Accounts
  • Reporting
  • Automation
• Implementing Password Policies are not
  easy, at best
• Expired Passwords
  • Actions
What Does ScriptLogic Offer?
• Simplified Password Policies
• Inactive Account Management
• Proactive Password Reminders




 DEMO!
Focus 5: Recovery
• It’s bound to happen
  • You’re going to accidentally delete an object
    that needs to be restored
  • You need to revert to an older version of an
    object
Recovery – What’s Free?
• DSRM
• AD Recycle Bin (2003R2)
   • Simple Example: Single Object
Get-ADObject -filter {displayName -eq 'DonJ'} -IncludeDeletedObjects | Restore-ADObject

• More complex recoveries may involve
   •   Determining the original location of the object(s)
   •   Restoring the OU
   •   Restoring the objects
   •   Resetting Passwords
   •   Etc.                                          http://bit.ly/kFoE0m
Recovery – What’s Lacking?
• Automation
• Simplified searches and selection
• Recovery granularity
  • Attributes
  • Security
What Does ScriptLogic Offer?
• Recovery of
  •   Objects
  •   Attributes
  •   Security
  •   Group Policies
• Done Online, in real-time without DSRM!

 DEMO!
Focus 6: Health
• Recognizing the “health” of AD is not
  immediately obvious
  • Are your DCs replicating?
  • If not, what is the cause of the problem?
  • How are you being notified of problems?
Health – What’s Free?
• Command-Line Tools
  • Repadmin
  • DCDiag
• PowerShell
  • Possible but way too complex
Health – What’s Lacking?
• Analysis
• Reporting
What Does ScriptLogic Offer?
• Replication Analysis
• Error Detail
• Reporting
  • Health
  • Configuration


  DEMO!
Summary
• 6 Areas of AD Management to Focus On
  • Security          • Accounts
  • Auditing          • Recovery
  • Group Policies    • Health
• Plenty of function in Free Tools
• Active Administrator centralizes,
  automates and simplifies these tasks.
Resources
• Active Administrator
 www.scriptlogic.com/aa
 • 30-day Evaluation
 • Walkthrough Tour
• Greg Shields
 www.concentratedtech.com
“SMB IT Simplified”
  www.scriptlogic.com/smbit
  • Real-world articles
  • Industry experts
  • Vendor-agnostic


Connect with us
Questions?
iPad Winner!

More Related Content

Viewers also liked

Bringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing AnarchyBringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing Anarchy
ScriptLogic
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
ScriptLogic
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceScriptLogic
 
Greater than, less than, equal to ppt
Greater than, less than, equal to pptGreater than, less than, equal to ppt
Greater than, less than, equal to pptAshley Judy
 
Greater than, Less than, Equal to
Greater than, Less than, Equal toGreater than, Less than, Equal to
Greater than, Less than, Equal toAshley Judy
 
Expedice RS Kilimanjaro
Expedice RS KilimanjaroExpedice RS Kilimanjaro
Expedice RS Kilimanjaro
NF Impuls
 
Manual de-gestion-escolar-2015
Manual de-gestion-escolar-2015Manual de-gestion-escolar-2015
Manual de-gestion-escolar-2015
nora calcina puntaca
 
Webcast: Building a Better Help Desk
Webcast: Building a Better Help DeskWebcast: Building a Better Help Desk
Webcast: Building a Better Help Desk
ScriptLogic
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin Rights
ScriptLogic
 
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
ScriptLogic
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
ScriptLogic
 
Greater than, Less than, Equal to
Greater than, Less than, Equal toGreater than, Less than, Equal to
Greater than, Less than, Equal toAshley Judy
 

Viewers also liked (14)

Bringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing AnarchyBringing Order to your Software Licensing Anarchy
Bringing Order to your Software Licensing Anarchy
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled Performance
 
Antonyms
AntonymsAntonyms
Antonyms
 
Greater than, less than, equal to ppt
Greater than, less than, equal to pptGreater than, less than, equal to ppt
Greater than, less than, equal to ppt
 
Greater than, Less than, Equal to
Greater than, Less than, Equal toGreater than, Less than, Equal to
Greater than, Less than, Equal to
 
Expedice RS Kilimanjaro
Expedice RS KilimanjaroExpedice RS Kilimanjaro
Expedice RS Kilimanjaro
 
Manual de-gestion-escolar-2015
Manual de-gestion-escolar-2015Manual de-gestion-escolar-2015
Manual de-gestion-escolar-2015
 
Webcast: Building a Better Help Desk
Webcast: Building a Better Help DeskWebcast: Building a Better Help Desk
Webcast: Building a Better Help Desk
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin Rights
 
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
 
Greater than, Less than, Equal to
Greater than, Less than, Equal toGreater than, Less than, Equal to
Greater than, Less than, Equal to
 
Number ppt
Number pptNumber ppt
Number ppt
 

Similar to The “Other” 5 Things You Need to Care About in Active Directory

The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
Cprime
 
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEANGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX, Inc.
 
Agile and Lean Software Development
Agile and Lean Software DevelopmentAgile and Lean Software Development
Agile and Lean Software Development
Tathagat Varma
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
eG Innovations
 
Governance is Not An Option
Governance is Not An OptionGovernance is Not An Option
Governance is Not An Option
spsnyc
 
DBmaestro's State of the Database Continuous Delivery Survey- Findings Revealed
DBmaestro's State of the Database Continuous Delivery Survey- Findings RevealedDBmaestro's State of the Database Continuous Delivery Survey- Findings Revealed
DBmaestro's State of the Database Continuous Delivery Survey- Findings Revealed
DBmaestro - Database DevOps
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Teemu Tiainen
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Christian Buckley
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
C/D/H Technology Consultants
 
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoCSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
NCCOMMS
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...Charley Hanania
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory Environment
Quest
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
Evan Hodges
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
JoAnna Cheshire
 
In (database) automation we trust
In (database) automation we trustIn (database) automation we trust
In (database) automation we trust
DBmaestro - Database DevOps
 
Agile at Salesforce From theory to practice, how to be agile at scale
Agile at Salesforce From theory to practice, how to be agile at scaleAgile at Salesforce From theory to practice, how to be agile at scale
Agile at Salesforce From theory to practice, how to be agile at scale
Salesforce Engineering
 
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Sanjay Willie
 
Insights into Windows 10 for the Enterprise
Insights into Windows 10 for the EnterpriseInsights into Windows 10 for the Enterprise
Insights into Windows 10 for the Enterprise
Ivanti
 
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
Puppet
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
DianaGray10
 

Similar to The “Other” 5 Things You Need to Care About in Active Directory (20)

The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEANGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
 
Agile and Lean Software Development
Agile and Lean Software DevelopmentAgile and Lean Software Development
Agile and Lean Software Development
 
7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero7 Secrets to Becoming a Citrix Hero
7 Secrets to Becoming a Citrix Hero
 
Governance is Not An Option
Governance is Not An OptionGovernance is Not An Option
Governance is Not An Option
 
DBmaestro's State of the Database Continuous Delivery Survey- Findings Revealed
DBmaestro's State of the Database Continuous Delivery Survey- Findings RevealedDBmaestro's State of the Database Continuous Delivery Survey- Findings Revealed
DBmaestro's State of the Database Continuous Delivery Survey- Findings Revealed
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoCSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
 
Mitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory EnvironmentMitigating Risk in a Complex Hybrid Directory Environment
Mitigating Risk in a Complex Hybrid Directory Environment
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
 
In (database) automation we trust
In (database) automation we trustIn (database) automation we trust
In (database) automation we trust
 
Agile at Salesforce From theory to practice, how to be agile at scale
Agile at Salesforce From theory to practice, how to be agile at scaleAgile at Salesforce From theory to practice, how to be agile at scale
Agile at Salesforce From theory to practice, how to be agile at scale
 
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...
 
Insights into Windows 10 for the Enterprise
Insights into Windows 10 for the EnterpriseInsights into Windows 10 for the Enterprise
Insights into Windows 10 for the Enterprise
 
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
The Business Value of Modernizing your Windows Infrastructure and Bringing Li...
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

The “Other” 5 Things You Need to Care About in Active Directory

  • 1. The “Other” 5 Things You Should Care About in AD Dial In: +1 (213) 289-0020 Access Code: 400-839-152 Or use your computer speakers Greg Shields, MVP Nick Cavalancia Partner and Principal Technologist VP, Windows Management www.ConcentratedTech.com ScriptLogic
  • 2. About the Speakers Greg Shields Greg is a Senior Partner and Principal Technologist with Concentrated Technology. He is a Contributing Editor for TechNet Magazine and Redmond Magazine, and a Series Editor for Realtime Publishers. Greg is a sought-after and top- ranked speaker, seen regularly at conferences like TechMentor, Tech Ed, VMworld, and more. He is a multiple recipient of Microsoft "Most Valuable Professional" award with has received VMware's vExpert award. Nick Cavalancia Nick Cavalancia, MCSE/MCT/MCNE/MCNI, is ScriptLogic’s VP of Windows Management where he assists in driving innovation and the evangelism of ScriptLogic solutions. He has over 17 years of enterprise IT experience and is an accomplished consultant, trainer, speaker, columnist and author. He has authored, co-authored and contributed to over a dozen books on Windows, Active Directory, Exchange and other Microsoft technologies.
  • 3. About ScriptLogic • Founded in 2000 • Focus on 4 key areas: • Desktop Management • Help Desk Management • Active Directory Management • Server Management • Customer Base • 30,800+ customers worldwide • From SMB to Fortune 100 • Headquartered in Boca Raton, Florida • Subsidiary of Quest Software since 2007
  • 4. Daily AD Management • It’s not just creating users and resetting passwords • There are six areas of AD management • Security • Accounts • Auditing • Recovery • Group Policies • Health • Let’s look at what’s free and what ScriptLogic offers
  • 5. Active Administrator • The single solution for AD management • Secure • Audit • Manage • Maintain • Prevent
  • 6. Focus 1: Security • Implementing security isn’t enough • Everyone’s creating groups, assigning rights, etc. • The establishing of a security standard alone isn’t enough. • You need a process that follows the security lifecycle to ensure AD is locked down properly • Assess, Assign, Audit… repeat
  • 7. Security– What’s Free? • Plenty of power in PowerShell • Free AD cmdlets from Quest Software • Get-QADPermission • Add-QADPermission • Remove-QADPermission • And more! http://bit.ly/1EAVF0
  • 8. What else is Free? • Native Tools • Nothing for Searching • Delegation Wizard
  • 9. Security - What’s Lacking? • Requires potentially complex scripting • Minimal management granularity • No documenting what’s in place
  • 10. What Does ScriptLogic Offer? • Security-Centric Interface • Simplified Security Assessment • Consistent Permissions Delegation • Automated Delegation Enforcement DEMO!
  • 11. Focus 2: Auditing • It’s one thing to know who has rights • It’s something entirely different to know • What they’re doing with those rights • What was changed • What the change value is
  • 12. Auditing – What’s Free? • Native Windows Auditing • Enable • Configure • Per-Server • Find the Needle! http://bit.ly/8n92Os
  • 13. Native Auditing – What’s Lacking? • Decentralized • Involved searches • No reporting
  • 14. What Does ScriptLogic Offer? • Centralized, Automated, Simplified • Auditing • Alerting • Actions DEMO!
  • 15. Focus 3: Group Policies • GPO management is a balanced mix of security, settings and strategy • There are over 3000 Group Policies with the release of Windows 7 • “With great power comes great responsibility” • Complex mix of layered policies requires some attention to ensure the proper outcome for the user
  • 16. GPOs – What’s Free? • GPMC of course • Delegation • Management • Basic Modeling • Result Reporting • Worth mentioning - AGPM with MDOP http://bit.ly/r6n90x
  • 17. GPOs – What’s Lacking? • Ability to make changes without impacting production • Quickly fixing changes that impact production
  • 18. What Does ScriptLogic Offer? • GPO History • Offline Editing • Advanced GPO Modeling DEMO!
  • 19. Focus 4: Accounts • Let’s look beyond managing users & groups • What about… • Password Policies that impact users? • Inactive Accounts? • Expired Passwords?
  • 20. Accounts – What’s Free? • Inactive Accounts – ADUC http://bit.ly/mY5B5T • Password Policies – ADUC • Expired Passwords – PowerShell get-aduser -filter {Enabled -eq $True} -properties passwordExpired | where {$_.passwordExpired} http://bit.ly/ow82tP
  • 21. Accounts – What’s Lacking? • Inactive Accounts • Reporting • Automation • Implementing Password Policies are not easy, at best • Expired Passwords • Actions
  • 22. What Does ScriptLogic Offer? • Simplified Password Policies • Inactive Account Management • Proactive Password Reminders DEMO!
  • 23. Focus 5: Recovery • It’s bound to happen • You’re going to accidentally delete an object that needs to be restored • You need to revert to an older version of an object
  • 24. Recovery – What’s Free? • DSRM • AD Recycle Bin (2003R2) • Simple Example: Single Object Get-ADObject -filter {displayName -eq 'DonJ'} -IncludeDeletedObjects | Restore-ADObject • More complex recoveries may involve • Determining the original location of the object(s) • Restoring the OU • Restoring the objects • Resetting Passwords • Etc. http://bit.ly/kFoE0m
  • 25. Recovery – What’s Lacking? • Automation • Simplified searches and selection • Recovery granularity • Attributes • Security
  • 26. What Does ScriptLogic Offer? • Recovery of • Objects • Attributes • Security • Group Policies • Done Online, in real-time without DSRM! DEMO!
  • 27. Focus 6: Health • Recognizing the “health” of AD is not immediately obvious • Are your DCs replicating? • If not, what is the cause of the problem? • How are you being notified of problems?
  • 28. Health – What’s Free? • Command-Line Tools • Repadmin • DCDiag • PowerShell • Possible but way too complex
  • 29. Health – What’s Lacking? • Analysis • Reporting
  • 30. What Does ScriptLogic Offer? • Replication Analysis • Error Detail • Reporting • Health • Configuration DEMO!
  • 31. Summary • 6 Areas of AD Management to Focus On • Security • Accounts • Auditing • Recovery • Group Policies • Health • Plenty of function in Free Tools • Active Administrator centralizes, automates and simplifies these tasks.
  • 32. Resources • Active Administrator www.scriptlogic.com/aa • 30-day Evaluation • Walkthrough Tour • Greg Shields www.concentratedtech.com
  • 33. “SMB IT Simplified” www.scriptlogic.com/smbit • Real-world articles • Industry experts • Vendor-agnostic Connect with us

Editor's Notes

  1. Assess, Assign, Audit is a security lifecycle:You first assess the current state of securityMake changes based on the assessmentAudit the usage of AD to ensure the changes are correctIf you see something out of whack – what would you do? Reassess, reassign, reaudit.