tag:blogger.com,1999:blog-1065597424192340732.post6462809975140716280..comments2012-11-01T01:04:11.718-07:00Comments on Kerberos Authentication in Windows: Kerberos Authentication in Windows Server based IT InfrastructuresAaronChttp://www.blogger.com/profile/09819344729958707905noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-1065597424192340732.post-15793639975175624092012-10-31T13:06:02.807-07:002012-10-31T13:06:02.807-07:00Hi Aaron,
I think of Active Directory Security as...Hi Aaron,<br /><br />I think of <a href="http://www.activedirsec.org" rel="nofollow">Active Directory Security</a> as being critical to business these days and <a href="http://www.active-directory-auditing-tool.com" rel="nofollow">Active Directory Auditing</a> is very important.<br /><br />Personally, I've found that the need to audit what is being audited in Active Directory is equally important as well.<br /><br />I recently came across a cool <a href="http://www.active-directory-acl-exporter.com" rel="nofollow">Active Directory ACL Export/Dump Tool</a> and have been using it for these audits.<br /><br />I thought you might find my experience with <a href="http://windows-security-log-events.blogspot.com/2012/10/how-to-audit-find-out-what-is-being.html" rel="nofollow">How to audit / find out what is being audited in Active Directory</a> helpful so thought of sharing it with you.<br /><br />Adios,<br />WillWill.Rhttps://www.blogger.com/profile/02328547654892503316noreply@blogger.comtag:blogger.com,1999:blog-1065597424192340732.post-77667598075556273402012-10-31T13:05:37.304-07:002012-10-31T13:05:37.304-07:00This comment has been removed by the author.Will.Rhttps://www.blogger.com/profile/02328547654892503316noreply@blogger.com