Skip to content

Active Directory, what you need to know

The history of this blog explaining what is what in the world of technology is long, we admit. Maybe one day we’ll release a compilation episode, sort of a cabaret musical thing, with all the info and even some special guests, why not! Meanwhile we also tell you what Active Directory is.

Do you already know what Active Directory is? We’ll tell you!
Both the LAN networks in general and Active Directory particularly, in a world as interconnected as this, are essential.

Private corporations, public institutions, private users like you… We all want to connect our computers and get the best Internet access we possibly can. And for this there is nothing like Active Directory. We ourselves use it!

Active Directory (AD or Active Directory) is a very useful tool (by Microsoft) that gives us directory services on a LAN.

Among its many virtues, we find that it provides us with a service, located on one or more servers, with the possibility of creating objects such as users, computers or groups to manage credentials.

A su vez nos ayuda a administrar las políticas de toda la red In turn, it helps us manage the policies of the entire network on which the server is located.

(User access management, customized mailboxes…)

Active Directory is a tool designed and redesigned by Microsoft for the working environment. That is, it works better in the professional field with great computer experts and ample technological resources.

(To manage multiple equipment, updates, installations of new and complex programs, centralized files, remote work …)

However, how does it work?
Ya We already know what it is, but how does Active Directory work?

The first we need to know are the network protocols that Active Directory uses:

  • LDAP.
  • DHCP.
  • KERBEROS.
  • DNS.

The second? Well, roughly, we will have before us some kind of database. A database where the information of the authentication credentials of the users of a network will be stored, in real time!

That way you will have all the teams joined together under a central element.

If you enter the Active Directory server, you’ll find a user made up by the common fields (Name, Surname, Email…).

This user corresponds to a specific group, which has certain advantages.

When users try to login, they will find a lock screen, and that will be the time to enter their credentials. On the other hand, the client will request the credentials from the Active Directory server, where they have been entered by the user, to be verified. That’s when the user will be able to log in normally and will have access to the files and resources that are allowed.

Hay al menos una cosa buena de todo esto, y esa es que si el There is at least one good thing about all of this, and that is that if the computer where you are working breaks down, because of the classic overturned coffee or the confusing lightning that comes through the window and attacks your PC, with Active Directory, all you would have to do is change to another computer connected to the network. Away, of course, from any window or unstable coffee.

Conclusions
Active Directory is an active directory created by Microsoft as a directory service on a distributed computer network. It uses several protocols.

These include LDAP, DNS, DHCP, and Kerberos.

Es un servicio establecido enIt is a service established on one or more servers, where you may create users, computers or groups, in order to manage logins on computers connected to the network. Also the administration of policies throughout the network.

And that’s it!

Nothing too complex, as you can read!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

ESET participates in joint efforts to strengthen cyber-resilience with NATO´s Locked Shields exercise

BRATISLAVA — May 5, 2022 — From April 19 to April 22, 2022, Locked Shields, the biggest international live-fire cyber defense exercise, took place in Tallinn, Estonia. Since 2010, the NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE) has been organizing this annual event, putting the cyber capability of NATO member countries to the test. This exercise took more than six months to prepare to ensure its success. It aims to strengthen the collective digital defense across the Alliance and test the skills of Allies. The participants had a unique opportunity to prove their ability to protect national civilian and military IT systems and critical infrastructure.

The Locked Shields 2022 exercise subjected around 5,500 virtualized systems to more than 8,000 live-fire attacks. However, the exercise is not as significant in its size as in its complexity. The involved teams had not only to prove their ability to protect entrusted critical infrastructure of an imaginary country, but also their effectiveness in reporting details about the situation on the digital battlefield, executing strategic decisions and solving forensic, legal and information operations challenges. For the first time, in 2022, the technical exercise also included the simulation of reserve management and financial messaging systems of a central bank. The main focus of the exercise was on the interdependencies of international IT systems.

This year, more than 2000 participants from 32 nations were involved. Twenty-four were NATO member nations, including the Slovak Republic who has taken part in the exercise every year and was joined in 2022 by cybersecurity experts from the Czech Republic. Since there was interest from many nations, several nations joined forces to create joint teams like the Slovak-Czech, Lithuanian-Polish, and Estonian-Georgian ones.

The Slovak-Czech team was formed from experts in the armed forces, government organizations, and the private sector, including ESET. Twenty-nine of ESET´s security experts participated in the exercise, helping the SK-CZ team to fifth place overall, and the top position in two subcategories: forensics and reporting.

ESET is glad to have had the opportunity to join Slovakia in this exercise once more and thus prove itself as a valuable member and partner to the country.

“Once again, the team from ESET demonstrated its technical expertise at Locked Shields 2022 and helped the Slovak-Czech blue team achieve a very good ranking. ESET’s products had high incident detection efficiency and enabled us to proactively respond to emerging threats in a short period of time. At thank you to everyone involved for their participation and high level of professionalism,” says, the Director of the Cyber Defence Center of the Slovak Republic.

The need for digital security and locking shields is increasingly evident given current events like the invasion in Ukraine and the COVID-19 pandemic. As the global community becomes increasingly dependent on technology, malicious cyber actors are growing their efforts to attack both public and private sectors. In response, the Locked Shields exercise uses the latest technologies to train national teams within an exercise environment based on realistic scenarios.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Failed Industroyer2 attack leads to calls for heightened vigilance on ICS networks


Russian-backed Group Attempts to Compromise Ukrainian Power Grid Using Industroyer2 Malware

As part of their ongoing military assault against neighboring Ukraine, Russian-backed hacker group Sandworm launched a series of cyber attacks that threaten the critical infrastructure of the beleaguered country. 

Continue reading

What is NIST and Why Is It Critical to Cybersecurity?

But along with the efficiency ofIn a completely digital world, it is normal for all sensitive data of a person or company to circulate and be stored on computers or mobile devices. Whether through websites, folders or applications.

 control and information disclosure, risks also came along. In different corners of the Internet, there are hidden threats that can steal personal data and cause a tremendous headache to any user.

Among these most common threats in everyday virtual life, we can highlight malware, short for malicious software.

What is Malware?

Malware is a type of computer program designed to infect a person’s device and harm them in many ways. It has various means of infecting computers and mobile devices, and it can also take many forms.

Spyware, viruses, worms, and Trojans are among these threats. Viruses are perhaps the most well-known type of malware and so are called because they are able to replicate various forms of themselves and spread across the network.

Each of them has a different “function”. Spyware, for example, copy and transmit personal information such as credit card numbers. Therefore, being well disguised in any corner of the Internet, the user must know how to identify them to protect themselves in every way.

Looking for more protection for your network? Then visit our website

and request a demo of our services!

How to Identify Malware

Malware can manifest itself in many different ways on devices. Paying attention to these signs is important to be able to neutralize any threat right away.

  • Reduced operating system speed, when browsing the internet or using local applications;
  • System shutdown, crash, or Blue Screen;
  • System and antivirus update failures;
  • Sudden appearance of new toolbars, extensions, or plugins;
  • Mysterious loss of disk space;
  • Change of browser homepage without permission or links that lead to unwanted destinations on the Internet;
  • Excessive ads in pop-up windows on the screen of devices;
  • The high usage of system resources and the computer’s fan working at a fast pace.

Nevertheless, even if everything is working normally on the devices, it does not mean everything is fine. A more powerful malware can hide on the computer and perform illegal activities without awakening any system alerts, managing to steal passwords or sensitive files.

How is The User Infected with Malware?

There are many ways in which a user can be tricked, infected by malware, and put their system and data at risk. The two most common ways it can access your system are on the Internet and through email.

Anything downloaded from the Internet to a device that does not have a quality anti-malware security application can pose risks to the user. The most common ways by which this can happen are:

  • Browsing on compromised websites;
  • Downloading infected music files;
  • Installing new toolbars from an unknown provider;
  • Clicking on game demos;
  • Configuring software from a risky source;
  • Opening suspicious email attachments.

But some can also hide in legitimate apps, especially when downloaded from websites or via messages, rather than through an app store.

Therefore, it is recommended to always use reliable sources of mobile apps or install apps from reputable providers, always downloading directly from the provider and never from other websites.

Even if a user installs something from a reputable source, failing to pay attention to requests for permission to install other program packages at the same time could end up installing unwanted software.

But there are much simpler ways to come across malware. Just visiting a malicious website, for example, or viewing a page and/or an infected ad, a malware download can take place.

How to Protect Yourself from Malware?

In order to protect your computer or network from malware, two things are necessary: always being vigilant to everything that appears on the Internet and using protection tools. It is always good to be on the lookout for any messages or suspicious activity on the system.

Sending emails is one of the main paths where malware is found. Seemingly harmless and unsuspecting messages can be the perfect trick to deceive the

user. It can be disguised as a message from a well-known company, banks, or even people you know in your family and friendship circles.

Emails that ask for passwords (mainly their confirmation) through links are quite common and dangerous. Thus, it is always good to be aware of everything you receive and analyze the situation carefully to find out if it is in fact true.

But personal surveillance alone is not enough. As already mentioned, malware can hide very well over the network and deceive any type of person, whether they are experienced in the matter or not.

When it comes to data security, especially for companies, it is essential to have reinforced security so that there is no risk of data leaks that could compromise an entire work.

An antivirus software package that is very efficient is what guarantees a technological defense capable of protecting computers and other electronic devices. It does a general system check to ensure it is malware-free.

It has a regular update that allows it to recognize the latest threats. It is also possible to warn of previously unknown malware threats based on their own technical resources.

With this anti-virus protection, it is also possible to detect suspicious websites, especially those that might trick the user into revealing passwords or account numbers. Effective protection also helps finances. They protect account information and provide password management.

However, this protection should be easy to use, simple to download and install. No protection is completely absolute, but using the right protection tools and having an awareness of what’s happening on the network ensures your data can be as protected as possible.

Do you want to learn more about how to protect your data from malicious attacks? Then visit our blog for more information and stay on top of everything you need to know!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.