How to Survive the 2026 Secure Boot Certificate Expiry
Deploy Windows UEFI CA 2023 before the June 2026 certificate expiry. Inventory devices, update OEM firmware, and trigger enrollment via Intune or PowerShell registry settings.
How to Survive the 2026 Secure Boot Certificate Expiry
Deploy Windows UEFI CA 2023 before the June 2026 certificate expiry. Inventory devices, update OEM firmware, and trigger enrollment via Intune or PowerShell registry settings.
How to Disable SMTP AUTH in Exchange Online Before December 2026
Audit SMTP AUTH usage with PowerShell, migrate devices and scripts to OAuth 2.0, and disable Basic Auth in Exchange Online before Microsoft's 2026 deadline.
Ditch the GPOs: Migrate to Microsoft Intune
Use Group Policy Analytics to migrate GPOs to Intune Settings Catalog profiles, handle unsupported Group Policy Preferences, and manage hybrid AD-to-MDM transitions.
Stop Leaving Money on the Table: IT Salary Negotiation
Learn salary negotiation strategies for IT professionals, from researching market rates with Levels.fyi to handling counteroffers and maximizing total compensation.
How to Ace the Modern Coding Interview as a SysAdmin
Master coding interviews for sysadmin and DevOps roles with practical preparation strategies. Learn Python, Bash, and platform-specific techniques that translate your operational experience into interview success.
How to Fix Active Directory’s #1 Weak Point in 2026: Passwords
It's 2026. Despite years of momentum around passwordless authentication, the reality in most enterprise environments is still the same: Active Directory remains at the core of identity infrastructure, and passwords are still the primary authentication mechanism. In that context, it's important to be clear: investing in an EDR or a SIEM does not automatically eliminate the biggest identity risks. A single credential leak, whether through phishing, password spraying, reuse, or data exposure, can be enough to compromise an entire Active Directory domain. At the same time, relying solely on traditional password best practices (complexity rules, uppercase letters, special characters, etc.) is no longer sufficient. That's not surprising: attack techniques have evolved significantly, while Active Directory's native security controls around credentials and authentication have seen limited evolution over the years. In this article, we'll break down the most common attack paths and the technical limitations of Active Directory, before exploring practical mitigation strategies and solutions that can effectively address these weaknesses. Why Active Directory Remains a Prime Target To understand why Active Directory remains one of the top targets, you need to look at the role it plays in enterprise environments. In most organizations, on-premises Active Directory is still the authoritative source of truth for authentication and access control. This remains true even in many hybrid setups, where Microsoft Entra ID (formerly Azure AD) handles cloud identities while AD continues to anchor the core identity layer. On a day-to-day basis, Active Directory is heavily involved in critical workflows: Kerberos authentication, access to file servers, RDP logons to servers, VPN authentication, and much more. In many cases, AD also extends into the cloud through Microsoft Entra Connect, synchronizing user objects, and often password hashes, to support hybrid identity scenarios. As a result, compromising Active Directory effectively means gaining control over the entire identity backbone: the "keys to the kingdom." That alone explains why AD remains a priority target wherever it is deployed.
EasyEntra: A Look at Hybrid User Management with Virtual Templates
EasyEntra consolidates Active Directory and Entra ID management into a single interface. This hands-on review explores Virtual User Templates—a feature that standardizes user provisioning across hybrid environments.
Active Directory: Add MFA to Windows with Specops Secure Access
Learn how to deploy Specops Secure Access to add multi-factor authentication (MFA) to Windows logins and Remote Desktop connections in Active Directory environments.
How to Block Known Bad Active Directory Passwords
In this article, we will explore why and how to block the use of certain passwords for Active Directory user accounts. In an Active Directory environment, password security is a critical factor in protecting user accounts against cyberattacks. However, even with a strict password policy in place, some users or administrators may still choose weak passwords or ones that can be easily guessed. To strengthen the security of your domain, it is possible to prevent the use of specific passwords. If blocking bad Active Directory passwords is part of a larger identity-security learning plan, compare Udemy technical training courses for cloud, development, security, and business software skills before paying for another course library. Why block certain passwords? There are several scenarios in which it is advisable to prevent users or administrators from setting specific passwords. The larger and older an Active Directory environment becomes, the higher the likelihood of poor practices and notable weaknesses. Throughout my career as a pentester, I have conducted numerous internal penetration tests in companies of different sizes, levels of maturity, and industries. In many cases, password reuse across multiple user accounts allowed me to compromise several accounts, including privileged ones, which sometimes led to the complete compromise of the domain. To strengthen security and increase resilience against cyberattacks, it may be necessary to block specific passwords, especially when they arise from the following situations. Common initial password for all accounts A common practice within administration teams is to assign the same initial password (often referred to as a default password) to every new user, with the instruction to change it as soon as possible. A typical example of such a password could be “Welcome2024!”. However, this password change is not always enforced, especially when it is not technically required. In many cases, it is possible to find user accounts still configured with this password even years after their creation, either because they were never used, or because the password change requirement was not applied (e.g., technical accounts, test accounts, or so-called temporary accounts).
Migrating from PowerShell 6 to 7.5: Breaking Changes/New Features
Migrate from PowerShell Core 6 to 7.5: breaking changes, features, and testing tips.
Boost your Active Directory Security with this Free Audit
Scan your Active Directory passwords for strength and find weaknesses with a free Specops audit.
Fortifying the Frontline: Protecting Helpdesks from Social Engineering
Helpdesks are prime targets for social engineering. Specops Secure Service Desk ensures only verified users gain access, stopping attackers at the source.
How to Add Timeouts to Pester Tests with PowerShell Runspaces
Prevent Pester tests from hanging indefinitely using PowerShell runspaces. Learn to handle variable scoping, module loading, TestDrive access, and stream capture challenges with timeout protection.
PowerShell 101: Creating a Module Manifest
Maybe you’ve put together some great functions but struggle to make them cohesive, intuitive, or shareable. Without a way to define your module’s identity and functionality, managing or scaling as your scripts evolve into robust tools can be a headache. Not unless you have a module manifest in place. Think of a module manifest as the backbone of your PowerShell module. In this guide, you’ll learn what a manifest is and how to create one that simplifies management and enhances usability. Paid link disclosure: AffiliateMagic may earn a commission if you buy through the linked review. If this PowerShell workflow needs to become a repeatable team skill, compare Udemy technical training courses for cloud, development, security, and business software learning paths before choosing a paid course. Prerequisites To follow along with this tutorial, ensure you have: PowerShell 5.1 or PowerShell 7+ installed Administrative access to create files in the PowerShell modules directory A basic PowerShell module (.psm1 file) ready to enhance with a manifest What is a PowerShell Module Manifest? A module manifest is a PowerShell data file (.psd1) that contains metadata about your module. It’s essentially a hashtable that tells PowerShell: Which functions to expose What PowerShell versions are compatible Who created the module and when What dependencies the module requires How the module should behave when imported Without a manifest, PowerShell modules still work but lack professional polish and control. The manifest transforms a collection of scripts into a manageable, versioned package. Creating and Naming a Manifest A manifest file must follow specific naming conventions. Name the manifest file after your module with a .psd1 extension. For example, if your module is named ComputerInventory, the manifest file should be ComputerInventory.psd1. Using New-ModuleManifest While you can create a manifest manually, the New-ModuleManifest cmdlet simplifies the process. Here’s a complete example: New-ModuleManifest -Path 'C:\Program Files\PowerShell\Modules\ComputerInventory\ComputerInventory.psd1' ` -RootModule 'ComputerInventory.psm1' ` -ModuleVersion '1.0.0' ` -Guid (New-Guid).Guid ` -Author 'Your Name' ` -CompanyName 'Your Organization' ` -Description 'A module for collecting computer hardware inventory information' ` -PowerShellVersion '5.1' ` -FunctionsToExport 'Get-MemoryInfo','Get-ProcessorInfo','Get-StorageInfo' ` -CompatiblePSEditions 'Core','Desktop' Understanding the Parameters Path – Where to create the manifest file.
Creating a Real-World Module: Creating Functions
Learn how to create PowerShell functions that gather memory, storage, and processor information from remote systems, transforming raw output into readable formats.