Bye-bye, password frustration: Why TEAL is now going passwordless
As security consultants, we see every day that passwords are not only a security risk, but also slow you down massively in your everyday work. That's why we at TEAL have decided: ...
As security consultants, we see every day that passwords are not only a security risk, but also slow you down massively in your everyday work. That's why we at TEAL have decided: ...
The alternative to NTLM* is called Kerberos and has been integrated into Active Directory since 2000. The most important difference to NTLM is the integration of a Key Distribution Center (KDC)...
The clock is ticking for one of the longest-lasting (and most insecure) ciphers in our networks. Microsoft is getting serious and pushing for the shutdown of RC4 encryption in the Kerberos protocol....
In many German companies, IT projects fall short of their goals or fail completely. The data speaks for itself: according to the Boston Consulting Group, around 70% of digital transformation projects fail to ...
With the introduction of Windows Server 2025, the page size of the Active Directory database (AD database) was increased from 8 kilobytes (KB) to 32 KB. This significant increase...
Windows Server 2025 as a domain controller sounds like progress, but in mixed environments it can become a risk that should not be underestimated. Our clear opinion: Anyone who now recklessly...
In mid-September, we had the opportunity to host a meetup at TEAL for the very first time, together with the Cybersecurity Region Stuttgart Meetup (CSRSM). It was a real highlight for us: a full house, ...
In this article, we show how HvS and TEAL combine their expertise, what a typical procedure for a security incident looks like, and what concrete added value our collaboration creates for companies that want to take ...
Many companies talk about information security, but hardly anyone talks about the reality behind it or dares to really tackle it. Gregor, our internal information security officer...
We chose Erfurt as the location for our Q2 Team Event 2025 this year. For three days, the focus was on getting to know each other personally, exchanging professional ideas, and looking to the future together....
PART 2: Many successful cyberattacks—whether carried out by state-sponsored groups or professional cybercriminals—have one thing in common: they exploit compromised user accounts. The attack often begins with a single access point....
PART 1: In our two-part series, we would like to discuss the current guidelines on the topic of “State of the Art in IT Security” from the TeleTrusT working group and present our perspective. Let's get started!...
Our Managing Director and Security Architect, Fabian Böhm, was recently on the Stegmann and Company podcast "Bits and Bytes" with Alexa Dippold and talked about this often neglected topic. And the key message is...
Our focus was not only on optimizing our internal processes, but also on expanding our network and physical presence in the IT security industry. In this article, we would like to share the highlights of 2024...
It was a special premiere for TEAL: together with our partner FB Pro GmbH, we were not only represented there as an exhibitor for the first time, but were also able to offer real added value for the 40 or so participants with ...
In this article, we give you a closer look at the importance of Microsoft Tiering for your IT security. We have looked at the underlying issues and the critical areas and systems that need to be protected to prevent total loss ...
This year we will be represented for the first time together with our partner FB Pro GmbH with a stand and a specialist lecture at one of the most important IT security trade fairs in Europe: it-sa 2024 in Nuremberg...
A new version of LAPS - Windows LAPS - has been available for some time now. In this article, we will look at the new features and discuss whether it makes sense to migrate to the new version....
In order to meet the requirements of ISO 27001, you must continuously identify technical vulnerabilities in your IT infrastructure, subject them to a risk assessment and minimize the risk by implementing improvement measures...
We are often asked why we do not harden systems using group policies or group policy objects. The simple answer to this is: handling is extremely inefficient, which leads to unsatisfactory results....
Today we want to take a look behind the scenes of our security assessment, but what is it anyway? In a nutshell, we enable you to make informed decisions and base your next steps on a solid, risk-aware foundation....
How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that. SpecterOps recommends their customers establish a security boundary around their most critical assets (i.e., Tier Zero) of Active Directory (AD). ...
Together with one of our partners FB Pro, we will be at stand 58 in the Eilenriedehalle in the Hannover Congress Centrum. Our focus will be on a central topic that is of crucial importance in the cyber security world: system hardening...
Since 2021, we have been offering our customers not only pure IT security consulting, but also a fully comprehensive managed service for our products. Above all, we have focussed on the topic of system hardening with the Enforce Administrator product...
2023 was a year full of successes and, above all, team spirit for TEAL. As an IT security company, we not only focus on the security of our customers, but also on the well-being of our own team. In this year in review, we would...
We present three proven methods that we have already used successfully with our customers. The approach can also be combined individually. However, we will focus on presenting the individual methods and ...
We will participate with TEAL in our first recruiting fair, respectively in our first Career Day at the Ruhr University Bochum - and of course we hope to meet many potential candidates and possibly future trainees for TEAL there!...
In addition to the technical security measures that are undoubtedly necessary, many of our customer inquiries have their origin in a certain lack of orientation, and the following questions often arise...
Since its launch, Teal's trainee program has already paved the way for many young talents to enter the world of IT security. One of these talents is Nils, who has been part of the program since March this year. The 12-month...
Last month was the first time Teal was a speaker at the Troopers 23 Security Conference in Heidelberg, Germany. In this blog post, we would like to share the topic we presented with a wider audience...
The pace of advancement and proliferation of AI technology has now increased tremendously. In the few weeks alone since the last blog on this subject...
When dealing with the topic of tiering, sooner or later you will come across the topic of Exchange. Exchange is known to have (too) extensive permissions in the Active Directory...
With the current handbook on cyber risk management, the BSI has published a very exciting and, in our view, groundbreaking guide as part of the "Alliance for Cyber Security" and the "Internet Security...
No, in the second part we will not have another interview with ChatGPT and admire at its capabilities. This time we will look at the development and possibilities of AI in general and venture a glimpse into the future, which in the IT world will...
In this interview, we offer you the opportunity to get to know an experienced Microsoft trainer and benefit from his expertise. In the interview with Lisa Werner from Teal, Torsten Fischer talks about his professional roots ...
Artificial Intelligence (AI) is a fascinating and always much discussed topic in today's technology and information society. Whether in science, industry or everyday life, the possibilities of AI can be unlimited...
This year we have successfully implemented many projects together and worked out individualized solutions & concepts. Therefore, we would like to say thank you to our customers and partners in this post. We wish you happy holidays, a reflective celebration and a happy new year...
In this blog article, we would like to discuss how easy it is to try BloodHound Enterprise and get convinced of its numerous benefits. We will explain what requirements...
We started our trainee program at Teal about 1.5 years ago and have so far trained or are about to train a total of six trainees as IT security experts in three six-month intervals. From August, our fourth run will begin and two new colleagues...
This blog post provides a high-level explanation of how to implement security boundaries in an on-prem AD and Azure environment to protect your critical assets based on the principle of ...
In this article on IPSec, we want to pick up our March 2019 article ESAE Series Part 5 - Windows IPSec and add some additional considerations. As written about in this post IPSec (short for "Internet Protocol...
After our last blog articles dealt with more general infrastructure topics (user installation, server deployment), this time we would like to focus more on a security topic again...
Today we are pleased to announce that we have partnered with SpecterOps to offer their first commercial product BloodHound Enterprise in Europe...
We are celebrating five years of TEAL with our team this month. Five years packed with constantly evolving know-how in customer work, internal projects and continuous growth of the company. With an increasing growing team and great customer projects, we have been able to develop...
In our blog post for this month, we look at the topic of user lifecycle processes. In every company, employees come and go, employees get married, go on parental leave, or get sick. You'd think that user lifecycle processes would be in place at every...
This year we have successfully implemented many projects together and worked out individualized solutions & concepts. Therefore, in this post we would like to say thank you to our customers and partners. We wish you happy holidays, a reflective celebration and a happy new year!...
Our blog post for this month deals with a topic that is not directly related to information security. Nevertheless, this topic should not be underestimated and neglected. It is about the automated installation of Windows Server in the enterprise....
IT consultants watch out! We are hiring and looking for new interested colleagues in the field of IT Consulting Active Directory. Finding specialists in the field of IT security is very difficult nowadays for small companies like us. Therefore we show...
In our last article of the “(E)SAE Deep Dive” series, we would like to look at the topic of system hardening today. Operators of critical infrastructures (CRITIS), for example, must ensure that “the state of the art” is implemented. This of course...
After a successful pilot phase, we at TEAL (Trusted Advisor in all matters related to information security) have decided to offer a 12-month traineeship to IT enthusiasts who want to jump-start their career, including a permanent contract and...
After we looked at patch management optimization last month, this month's topic is Credential Guard. Since there are already numerous articles on the technology as such, we would like to focus on...
This month our blog is about patch management. Today's software is complex, the source code of Windows includes several million lines of code, and vulnerabilities are discovered regularly...
Managed services and intelligent products instead of pure consulting. We are transforming ourselves and expanding our offering. At the same time, we want to keep coming up with new products and services. ...
This month we have reached step 6 of our Top Ten Controls. Today we are talking about Fine-Grained Password Policies....
This month we have reached step 6 of our Top Ten Controls. Today we are talking about Fine-Grained Password Policies....
The fact that program code contains security holes and that these are exploited by attackers has now become part of everyday life in the IT world. In addition to regularly installing patches...
The fourth part of our (E)SAE Deep Dive series is about regularly changing non-personalized accounts. As a reminder: In our July blog post we already presented the first of our top ten measures...
After Hyper-V HGS and VM protection with VMWare, now the third part of our (E) SAE Deep Dive Series follows. Maybe you follow us on LinkedIn, Xing, Facebook, Instagram or Twitter and ...
In our January blog, we started an SAE deep dive series and explained how to use Hyper-V as a secure hypervisor in an (E)SAE scenario. Since by far not all our customers use Hyper-V, but many also use VMWare...
This month we would like to give something back to the community. As you have read in our November blog, we use numerous open source tools for our Active Directory Assessment...
In times of Corona our life is mainly about isolating ourselves, in the worst case we fight for our existence or fear for friends or relatives. In addition, our working life has also changed...
After the success of the first ESAE series, we decided to launch a deep dive series in which we go into a little more detail on various measures....
The damage caused by cyber attacks is increasing every year and it is only a matter of time before a company is successfully attacked. Not only Microsoft says again...
In one of our SAE projects we have once again discovered an interesting problem. This time it is about a bug in the interaction of Windows Server 2019 CORE, Bitlocker ...
As you might have seen on our social media channels, we have taken a week off from customer projects to focus on our "next big thing". We consider Microsoft's ...
Already some time ago we started with our Naked TEAL campaign an initiative to remain one of the most attractive employers in consulting. A cornerstone of this journey is to hear what is important to our team a...
We are currently working on the next internal project, which we will report on in detail in due course. Until then we will blog at irregular intervals about technical stumbling blocks and their solution....
This month we would like to present you the promised version 2 of ContactAdder. What the ContactAdder is all about, you can read in part 1. In this release, we wanted to automate the execution of the script...
This month we would like to provide you with a small tool, which we have developed for internal use. We use Office 365 for collaboration. Each of our employees has a mobile phone, either IOS or Android. ...
TEAL has been intensively involved with Microsoft Active Directory Security projects since its foundation. We were able to work with several customers and ...
24 months after the foundation of TEAL, it's time to draw an interim balance and say THANK YOU. Thanks to our customers and thanks to our team. It's really fun with you!...
Welcome to the fifth part of our ESAE series. In this part, we would like to focus on an area that is not covered so comprehensively on the Internet - Windows IPSec. "IPsec (short for Internet Protocol Security) is a...
In this part of the series, we would like to reiterate the requirements from part 2 (Link) and demonstrate which measures have been taken to protect the critical systems....
As already announced in the last article (LINK) of the ESAE series, in this article we would like to give you a more in-depth description of the technical core ...
As announced in our introductory article on the ESAE series, we would like to elaborate on the client situation and the architecture of the solution in the second article....
In the blog category "Secure Administration Environment" we want to share our experiences from customer projects around Microsoft's Enhanced Security Administration Environment ...
Together with our partner FB Pro, we will be exhibiting at stand E38 in the Eilenriedehalle of the Hannover Congress Centrum and invite you to take the decisive step towards more IT security....
Below we would like to describe the top 3 challenges when hardening with GPOs and how the Enforce Administrator solves them. In addition, there are other topics that FB Pro will cover in this ...
Now that we have had the opportunity to develop and implement PAW concepts for various other customers, we feel that the time has come to go into more detail about individual aspects and share our experiences ...
We already explained in detail in our blog a few months ago that it is absolutely necessary to harden systems. In this article, we would like to discuss some of the most common stumbling blocks that we have encountered on customer projects. ...
When we published a blog post on Enhanced Security Admin Environment (ESAE) Retirement in early 2021, we had no way of knowing that it would become one of the most-read articles. Reason enough to reassess the situation a year later and reflect our current view....
The fact that program code contains security holes and that these are exploited by attackers has now become part of everyday life in the IT world. In addition to regularly installing patches to eliminate these security holes....
After we wrote about the new Microsoft Securing Privilege Access Model in our last blog article, we would like to discuss the classic ESAE tiering this time....