AD Security 101: SIEM Tools and AD Monitoring

Before we dive into technical tips that I mentioned in my previous post, I want to raise an important point. If you’re relying solely on security information and event management (SIEM) tools for Active Directory (AD) security monitoring—especially against potential...

How to Shift Left: Your Six-Step Framework

Shorten the service lifecycle, improve customer relationships, and reduce service costs. Here’s your six-step framework to shift your customer experience left.  The concept of shifting left sounds great but how can you, as a service leader, put this concept into...

What Shifting Left Means For Service Organizations

Shorten the service lifecycle, improve customer relationships, and reduce service costs. Over the last decade, the evolution of service has resulted in a widening gap between rising customer expectations and growing workforce challenges. Accordingly, organizations...

AD Security Research: Breaking Trust Transitivity

While playing with Kerberos tickets, I discovered an issue that allowed me to authenticate to other domains within an Active Directory (AD) forest across external non-transitive trusts. This means that there is in fact no such thing as a “non-transitive trust.” The...