The principal of least privilege—How federal agencies leverage POLP to protect and secure their IT systems

This article originally appeared on Quest Software’s official blog, HERE. It may come as a surprise that for many years the concept of least privilege was foreign in a Windows network. It would not have been uncommon in the past…

Quest Public Sector on the 5 cybersecurity benefits tiered administration delivers to the federal government

While operating within an ever evolving and complex cybersecurity landscape, federal agencies face difficult decisions around what to prioritize for protection and recovery in the face of advanced security threats. There are a few things that can be done to…

Quest’s Chris Roberts on how federal agencies can bridge the skills gap between legacy Active Directory and Azure

It is a well-known fact that the majority of federal government agencies utilize on-premise Active Directory (AD) as the primary directory service for their IT infrastructures. But with the federal government encouraging agencies to follow aspirational federal IT initiatives like…

Quest’s Chris Roberts on the current state of federal zero trust

It has been more than two years since President Biden released his Executive Order (EO) on Improving the Nation’s Cybersecurity. Paramount to this EO was the directive for federal agencies to move towards adopting and implementing zero trust cybersecurity architectures.…

Active Directory Management (Part 2) – How automated and enhanced AD management tools sharpen federal cybersecurity

In our last article, the GovCyberHub sat down with Eric Weiss, Sr. Technology Executive at Quest Software Public Sector, Inc., to examine the current state of federal agencies’ Active Directory environments. This week, Eric returns to take a deep dive…

Active Directory Management (Part 1) – Quest’s Senior Technology Executive examines the current state of federal agencies’ AD environments

It’s hard to believe that it has been 23 years since Microsoft’s Active Directory (AD) was released. Since its debut as a part of Windows 2000 Server, AD has gone through many evolutions and iterations to become the complex platform…

AD migration and consolidation (Part 2)—The tools and best practices federal agencies should employ to reach their desired end-states

In our last article, the GovCyberHub sat down with Quest Software’s Chris Esler to examine the reasons why federal agencies migrate and consolidate their Active Directory (AD) environments, as well as delve into the many different benefits these processes deliver…

AD consolidation and migration (Part 1)—What federal agencies need to plan for and consider beforehand

As federal IT continues to evolve, it is not uncommon for government agencies to reorganize how they conduct business to match the pace of advancements in technologies. Add into the mix that administrations and leadership can change every four years,…

The four-pronged, app migration approach federal agencies can take in Azure AD

As federal government agencies continue modernizing their operating environments through cloud adoption, it is more than likely that each agency has a multitude of different cloud applications that are being utilized at one time. Some of these applications might be…

How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks

When the average federal employee logs into their workstation at the beginning of the day, it’s more than likely they are unaware of the thousands of unseen configurations and network controls that power their IT infrastructure. Some portions of the…