• Products
    • View all products
    • Free trials
    • Buy online
  • Solutions
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Services
    • Consulting Services
      • Overview
      • Microsoft Platform Services
      • Data Protection Services
      • Unified Endpoint Management
      • Performance Monitoring Services
      • Database Management Services
    • Educational Services
    • Support Services
  • Support
    • Support Home
    • By Product
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Consulting Services
      • Microsoft Platform Management
      • Data Protection
      • Unified Endpoint Management
      • Performance Monitoring
      • Database Management
    • Technical Documentation
    • Educational Services
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Technology Partners
    • Partner Community
    • Deal Alert
  • Blogs
    • IT Industry Insights
    • Quest Solution Blogs
      • Data Protection
      • Database Management
      • ITNinja
      • Microsoft Platform Management
      • Performance Monitoring
      • Toad World Blog
      • Unified Endpoint Management
  • Forums
  • 製品情報
    • すべての製品情報%E3%82%92見る
    • Change Auditor
    • Foglight
    • KACE
    • Metalogix
    • Migration Manager
    • Migrator for Notes to SharePoint
    • NetVault Backup
    • On Demand Migration for Email
    • QoreStor
    • Rapid Recovery
    • Recovery Manager
    • SharePlex
    • Spotlight
    • Toad
  • ソリューション
    • すべてのプラットフォームを見る
    • クラウド管理
    • GDPRコンプライアンス
    • データ保護
      • 概要
      • クラウド管理
      • ディザスタリカバリ
      • バックアップとリカバリ
      • Office 365 データ保護
      • 仮想化管理
      • 重複除外と複製
    • データベース管理
      • 概要
      • DevOps
      • データの準備と分析
      • データベースのクラウド移行
      • データベースパフォーマンス監視
      • データベース管理
      • データベース複製ソフトウェアツール
    • 統合エンドポイント管理
      • 概要
      • エンドポイントコンプライアンス
      • エンドポイントセキュリティ
      • エンドポイントの可視化
    • Microsoftプラットフォーム管理
      • 概要
      • ハイブリッドActive Directoryのセキュリティとガバナンス
      • Microsoftプラットフォームの移行計画と統合
      • セキュリティとコンプライアンス
      • 情報アーカイブおよびストレージ管理ソリューション
      • Windowsのバックアップとリカバリ
      • Microsoft Serverのパフォーマンスと可用性
      • レポート作成機能
      • グループポリシーと権限
    • パフォーマンス監視
  • サービス
    • コンサルティングサービス
      • 概要
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • トレーニングと認定資格
    • サポートサービス
  • サポート
    • サポートホーム
    • 製品で検索
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • お問い合わせ
      • すべて
      • カスタマサービス
      • ライセンス アシスタンス
      • 更新のアシス%E3%82%BFンス
      • 技術サポート
    • コミュ%E3%83%8Bティフォーラム
    • ソフトウェアのダウン%E3%83%ADード
    • ナ%E3%83%AC%E3%83%83ジ%E3%83%99ース
    • マイアカウント
      • マイ プロダクト
      • Myサービスリクエスト
      • マイ ライセンス
      • マイ グループ
      • マイ プ%E3%83%ADフ%E3%82%A1イル
    • ポリ%E3%82%B7ーおよび手順
    • コンサル%E3%83%86ィングサー%E3%83%93ス
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • リリースノートおよびガイド
    • 教育サービス
    • ビデオチュートリアル
  • トライアル
  • パートナー
    • 概要
    • Partner Circleへのログイン
    • パートナーになる
    • Find a Partner
    • パートナーコミュニティ
    • Deal Alert
  • コミュニティ
Quest Community
Quest Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • Data Protection
  • Database Management
  • Microsoft Platform Management
  • Performance Monitoring
  • Unified Endpoint Management
  • Quest
  • More
  • Cancel
  • New
  • All tags
  • Security
  • Active Directory security
  • Active Directory
  • ActiveDirectory
  • AD security
  • audit
  • Azure Active Directory
  • azure active directory security
  • Change Auditor
  • ChangeAuditor
  • cloud security challenges
  • Compliance
  • Compliance/Audits/Security
  • Compliance/Audits/Security compliance
  • cyber security
  • hipaa
  • hybrid cloud architecture
  • microsoft
  • Microsoft Platform Management
  • Migration
  • Office 365
  • Office 365 security
  • PCI
  • phishing
  • Ransomware
  • Reporting
  • UEBA
  • Shields up: Stopping identity attacks before they start

    Shields up: Stopping identity attacks before they start

    amr alkhayri
    amr alkhayri

    Shields up: Stopping identity attacks before they start

    Identity-based attacks are escalating at an alarming rate. Yet, many organizations still rely on passive alerts that provide no real defense, leaving them vulnerable to threats that move too fast…

    • 3 months ago
    • Blogs
    • Microsoft Platform Management
  • Microsoft and Quest Enhance Partnership Through Microsoft Azure Marketplace Partner Programs

    Daniel Gauntner
    Daniel Gauntner

    Today we’re thrilled to announce that Microsoft selected Quest as a strategic partner in two Microsoft Azure Marketplace partner programs. This underscores Quest’s ongoing commitment to help organizations and governments around the world secure and modernize…

    • 10 months ago
    • Blogs
    • Microsoft Platform Management
  • Testing the Recovery from DCShadow Attacks

    Testing the Recovery from DCShadow Attacks

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    MITRE ATT&CK reports that a “rogue” domain controller could be used to manipulate data in Active Directory. This attack, known as a DCShadow attack, requires you to have administrative rights, but also allows the actions that are modified to be hidden…

    • over 3 years ago
    • Blogs
    • Microsoft Platform Management
  • Strengthening Active Directory Security: 3 Best Practices for Implementing a Zero Trust Model

    Strengthening Active Directory Security: 3 Best Practices for Implementing a Zero Trust Model

    Matthew Vinton
    Matthew Vinton

    If you’re interested in Active Directory security, you’ve undoubtedly heard of the Zero Trust model. Briefly, Zero Trust is a great security model for modern IT environments because it assumes that breaches are inevitable and malicious actors…

    • over 3 years ago
    • Blogs
    • Microsoft Platform Management
  • Side-Channel Attack: What is it and How does it Impact Active Directory Security?

    Side-Channel Attack: What is it and How does it Impact Active Directory Security?

    Jennifer LuPiba
    Jennifer LuPiba

    CPU Side-channel attacks have grabbed the headlines since January 4, 2018 with the announcement of Spectre and Meltdown.  In this post we’ll define side-channel attacks, what they are not and where they could impact your Active Directory securit…

    • over 6 years ago
    • Blogs
    • Microsoft Platform Management
  • Zero trust model

    Zero Trust: What It Is, Why You Need It, and How to Get Started

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    Everybody’s talking about Zero Trust these days. In particular, Microsoft recently announced that it is adopting a Zero Trust model, and the NSA has issued guidance to help other organizations implement it, too.

    But exactly what is it? Should your…

    • over 3 years ago
    • Blogs
    • Microsoft Platform Management
  • How Hackers Exploit Group Policy Objects (GPOs) to Attack Your Active Directory

    How Hackers Exploit Group Policy Objects (GPOs) to Attack Your Active Directory

    Matthew Vinton
    Matthew Vinton

    Psst! Want to know a great way to spread ransomware across a corporate network? Compromise the organization’s Group Policy.

    Want to know a great way to cripple an organization’s defenses against data theft? Compromise Group Policy.

    In fact…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • Locking down Active Directory security

    Locking down Active Directory security

    Natalie.Updike
    Natalie.Updike

    You’ve undoubtedly put a variety of defenses in place to limit the ability of attackers to enter your network — but attackers are notoriously clever and persistent little devils. On the one hand, they barrage your network with brute-force attacks…

    • over 6 years ago
    • Blogs
    • Microsoft Platform Management
  • How to Fix and Prevent Privileged Access Issues to Improve Hybrid AD and Cloud Security

    How to Fix and Prevent Privileged Access Issues to Improve Hybrid AD and Cloud Security

    Daniel Gauntner
    Daniel Gauntner

    Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Azure Active Directory syncing to on-premises AD: Is it as secure as you think?

    Azure Active Directory syncing to on-premises AD: Is it as secure as you think?

    Shawny Reiner
    Shawny Reiner

    The cloud. Those of us in IT for any length of time have been hearing about this elusive creature for a decade or more now. At first, we rejected it. “That’ll never happen. My infrastructure isn’t going into the cloud!” Sound familiar? It should; I’ve…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • ‘WannaCry’ Attack – Another Microsoft Environment of Yours May Not Be Secure

    ‘WannaCry’ Attack – Another Microsoft Environment of Yours May Not Be Secure

    Austin Collins
    Austin Collins

    If you’ve connected to headline news in any way - watch, listen, or read - since last Friday then you must have heard about the massive cyber-attack - WannaCry – a ransomware attack on Microsoft Windows operating systems that have infected more…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Shark Week: Are You Tracking the Behavior of the Sharks in Your Network? #Securonix

    Thom Brainard
    Thom Brainard

    Dell Teams with Securonix to Provide Advanced Security Analytics for Active Directory and Enterprise Applications


    There are a lot of sharks swimming around your network. Most are friendly, but some are not. Can you tell the difference?

    Fortunately, you…

    • over 8 years ago
    • Blogs
    • Blog
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Contact Us
    • Careers
    • News
  • Resources
    • Industry Insights Blog
    • Communities
    • Customer Stories
    • Documents
    • Events
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • Training & Certification
    • Support Services
  • Social Networks
    • Facebook
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center
  • 会社名
    • 会社情報
    • 購入
    • お問い合わせ
    • 採用情報
    • ニュース
  • リソース
    • ブログ
    • お客様の事例
    • ドキュメント
    • イベント
    • ビデオ
  • サポート
    • プロフェッショナルサービス
    • サポートの更新
    • テクニカルサポート
    • トレーニングと認定資格
    • サポートサービス
  • ソーシャルネットワーク
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • 「法務」
  • ご利用規約
  • 個人情報保護方針
  • コミュニティのフィードバックとサポート