Plan Do Check

Security

Best Practices for Administering Microsoft 365 and Related Services

There is no warranty of this information. Make changes after consulting with your organizations leadership and change management process. Changes you make here will impact your organizations security posture Microsoft 365 admin center Step 1 - Ensure a policy and procedure is in place at the organization: In order for accounts to be effectively used in a break-glass situation, the proper policies and procedures must be authorized and distributed by senior management.

Exploring Attack Patterns: Exploiting Software Weaknesses Beyond Expectations

Exploring Attack Patterns: Exploiting Software Weaknesses Beyond Expectations Quality Assurance efforts usually focus on testing that the feature works as expected. In the security world, we examine the software functions in ways never imagined to give us more access to resources and data. Key Questions for Understanding the Technology To understand a technology or system, consider the following key questions: How does the technology work? What are the data inputs? What are the data outputs?

Understanding the "Account Operators" Group in Active Directory

Active Directory Privileged Access Introduction The challenge of understanding the access privileges of various groups in Active Directory. Often, the full impact of a group’s access is not fully comprehended by the organization. Attackers frequently exploit access, even if it’s not always privileged access, to compromise Active Directory. Components of Access Rights Active Directory group membership. AD groups with privileged rights on computers. Delegated rights to AD objects through modifications of default permissions (for security principals, both direct and indirect).