Browse by Tags

Tagged Content List
  • Blog Post: Six Audit Mistakes Everyone Seems To Make With Windows Server

    Hi, this is Richard Sasser 'Rick', MCM, Red shirted dude (security guy). This might seem like old data, but you’d be surprised how many people looked at Security Auditing in Windows Server 2008 and 2008R2, saw that the old policies applied, and subsequently just checked the box and moved forward...
  • Blog Post: Service Principal Name Attribute Limitations

    Jim Kelly here [edited by Richard P. Sasser], I've talked to a few customers and engineers lately, asking about character and entry limitations with the ServicePrincipalName Attribute. It is a common practice to use the same security principal to run multiple instances of an application, such as...
  • Blog Post: How LastLogonTimeStamp is Updated with Kerberos S4u2Self

    Introduction Hi! My name is Richard Sasser, or Rick, as I prefer, and I’m a Microsoft Certified Master for Active Directory and I work on the Platforms DSE team. I do a lot of security related work, and consult frequently on Public Key Infrastructures and Authentication issues. I don’t...
  • Blog Post: Choosing a Hash and Encryption Algorithm for a new PKI?

    I frequently get asked to consult on building out new Public Key Infrastructures here in Premier Field Engineering. One of the things that I get asked commonly is “How do I choose a key length and Hash Algorithm?”. That’s a complex question, that generally is difficult to answer, but I thought I might...