Skip to content

ITech

Tag: Active Directory

  • Home
  • Active Directory
Cybersecurity Systems

Bad vs Better: 6 Practical Windows Security Config Patterns

Security hardening often fails because teams know what is “bad” but don’t have a practical “better” pattern to implement. This guide gives six common Windows/PowerShell…

Editorial Team March 31, 2026April 27, 2026
Cybersecurity

10 PowerShell Commands for AD Health Checks and Security Triage

PowerShell can quickly surface Active Directory health and security-relevant user/computer signals during triage. This guide lists 10 practical commands for fast checks. 1) Find locked…

Editorial Team March 31, 2026April 27, 2026
Cloud Systems

Bind Azure File Share with Active Directory (Practical Setup Guide)

Azure File Share can integrate with on-prem Active Directory so users access SMB shares with domain credentials and NTFS-style permissions. This guide covers the generic…

Editorial Team January 12, 2023April 27, 2026
Systems

Add Thumbnail Photo to Active Directory (PowerShell Guide)

Updating thumbnailPhoto in Active Directory lets user profile photos appear consistently across Microsoft services (Outlook, Teams, and address lists), depending on sync configuration. Before you…

Editorial Team December 20, 2022April 27, 2026

Recent Posts

  • CISA KEV Weekly Changes: 48-Hour Patch Prioritization Workflow for Security Teams
  • BGP Hijack Early Warning for IT Teams: Practical Detection with Public Feeds and Router Telemetry
  • GitHub Actions OIDC to AWS: Secretless CI/CD Hardening Checklist
  • Defender Playbook: Hardening Microsoft Entra ID Against Token Theft
  • How to Protect Your Business from Lumma Stealer (Practical Defensive Playbook)
Copyright © 2026 ITech