There's a free tool (in its basic version) to help harden an AD: PingCastle. It audits your install and gives advices to strengthen the AD security.
== Bring us Dabbsy back! ==
Organizations hit earlier by the HermeticWiper malware have reportedly been menaced by ransomware unleashed this month against transportation and logistics industries in Ukraine and Poland. Though there is an overlap in victims, it's unclear whether this Prestige ransomware and HermeticWiper are controlled by the same …
There's a free tool (in its basic version) to help harden an AD: PingCastle. It audits your install and gives advices to strengthen the AD security.
== Bring us Dabbsy back! ==
"It's not yet clear how victims' networks were compromised by the extortionists to run their file-scrambling malware."
It would be most informative if the primary vector were explained more often (it hardly ever is), but I suspect that javascript has something to do with it if any attack is widespread. When will it sink in that running unvalidated code from untrusted sources is fundamentally dangerous? And when will web devs stop forcing us to do this unnecessarily in order to view their "wonderful creations"?
Ironically, even the UK government's National Cyber Security Centre web site is entirely a javascript app. You can't even see the emergency contact phone number with scripting disabled.