CionSystems Blog
6 FOLLOWERS
CionSystems is a company that provides solutions for securing and managing Active Directory (AD). CionSystems was founded to become the most comprehensive enterprise identity, access, and authentication management (IAM) solution provider in the world; with a laser focus on securing your active directory
CionSystems Auditor, Backup And Recovery For Microsoft Entra ID Now Avail In The Microsoft Market Pl
CionSystems Blog
1w ago
Microsoft Azure customers worldwide now gain access to CionSystem Audit, Backup and Recovery for Microsoft Entra ID to take advantage of the scalability, reliability, and agility of Azure to drive application development and shape business strategies REDMOND, Wash. – April 8, 2024
CionSystems, a leading provider of innovative identity management solutions, today announced the availability of CionSystems Auditor, Backup and Recovery for Microsoft Entra ID in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. CionSystems’ customers can now take ..read more
CionSystems Blog
5M ago
As organizations increasingly adopt cloud services, the need to maintain a seamless user experience across on-premises and cloud environments has become crucial. A key aspect of this is ensuring that user identities are consistent and synchronized between on-premises Active Directory (AD) and Azure Active Directory (Azure AD). This post delves into the practical steps of achieving this synchronization, offering valuable insights for IT professionals.
Understanding the Options: Soft Match vs. Hard Match
The process of syncing on-premises AD with Azure AD primarily revolves around two methods ..read more
CionSystems Blog
5M ago
This is for those wanting a refresher or just learning about AD.
Active Directory (AD), developed by Microsoft, is a cornerstone of modern enterprise IT infrastructure, providing a range of crucial services from access control to asset management. This comprehensive guide explores the intricacies and functionalities of Active Directory, offering insights into its operations, protocols, and best practices.
1. Overview of Active Directory:
Active Directory is a directory service for Windows domain networks, playing a pivotal role in asset management and access control. It’s a central part of the ..read more
CionSystems Blog
6M ago
Effectively managing user lifecycles in Active Directory is paramount for educational
institutions. With the constant flux of enrollments, course registrations, and other dynamics, IT
professionals must navigate unique challenges.
1. Automated Account Provisioning:
– The Need: As students and parents enroll, their accounts originate in the Student Information
Systems (SIS). However, a parallel needs to be established in downstream IT systems,
predominantly Active Directory. Beyond simple account creation, there's the added task of
syncing utilities such as email, file shares, printers ..read more
CionSystems Blog
8M ago
In the realm of Active Directory (AD), the Tombstone Lifetime is a property that holds significant importance. It determines the period a deleted object, known as a “tombstone”, remains in the directory service before it is permanently deleted. This period is crucial for the replication of the deletion to all other domain controllers in the network.
The Importance of Active Directory Tombstone Lifetime
Understanding and managing the Tombstone Lifetime is essential for two key reasons:
Replication Consistency: When an object is deleted in AD, it’s not immediately erased. Instead, it becomes a ..read more
CionSystems Blog
8M ago
Installers are hard to write. They generate a lot of customer support calls and seem to always need tweaking to support unforeseen or new customer environments. But installers fulfill several, important functions.
Obviously, software needs to get installed and configured. In addition, the installation process usually established the security context for many products. However, both vendors and customers encounter both a learning curve, and common pitfalls in many cases.
When security and core infrastructure is involved, this is a dangerous space to take shortcuts. For example, consider a Windo ..read more
CionSystems Blog
8M ago
Are you ready? Are you prepared?
https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html
Anne Neuberger, a top cyber security official at the National Security Council, warned, “All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location. We urge you to take ransomware crime seriously and ensure your corporate cyber defense match the threat.”
Active Directory is the “critical” component of any enterprise security. Checkout our solutions!
The post FBI director says cybersecurity threat is increasing “almost expo ..read more
CionSystems Blog
8M ago
Are you ready? Are you prepared?
Following are the recent cyberattacks that are targeted against education industry:
https://news.yahoo.com/fbi-director-says-cybersecurity-threat-202522727.html
https://abcnews.go.com/Politics/fbi-warns-cyberattacks-distance-learning/story?id=75038470
https://www.govtech.com/policy/2020-marks-a-record-breaking-year-for-cyber-attacks-against-schools.html
https://abcnews.go.com/Technology/wireStory/university-california-victim-nationwide-hack-attack-76847800
Active Directory is the “critical” component of any enterprise security. Checkout our solutions!
The post ..read more
CionSystems Blog
8M ago
CACLS: Change Access Control List
C:\> cacls foldername /e /p Username:F (Full Permission)
C:\> cacls foldername /D Username (to deny)
C:\> cacls foldername /e /p username:F (full control) (e:edit) (p:permission)
C:\> cacls “Foldername” /grant “Username”:F (full control)
C:\> cacls C:\Shared /e /p Everyone:F (to create a permission on shared folder)
where /e is to preserve old permissions, /p is to add new permissions
F: stands for Full control
R: Read
W: Write
C: Change
If you don’t include /e the permissions assigned will be the only permissions on the file / directory ..read more
CionSystems Blog
8M ago
Users with Windows servers may occasionally encounter an issue when an imported certificate disappears from the list of server certificates. Most often, this happens right after completing certificate request in Internet Information Services (IIS) Manager .
The lists of server certificates in IIS contains only certificates that are assigned to the corresponding private key and generated along with the certificate signing request (CSR) user for activating a particular certificate. When the link between certificate and private key is broken for some reason, the certificate disappears.
In order ..read more