
Philip Elder
10.1K posts

Philip Elder
@MPECSInc
Microsoft MVP '09-Present. We design & build HA solutions for on-premises, data centre, & hybrid. Workload Migration Specialists. Active Directory Security.






What I learned from 1,000 hours of internal pentesting in 2025. - LAPS is not as common as you’d think - The built-in domain Administrator account is often misused as a service account - Flat, non-segmented networks are the norm - Too much stock is put into EDR alone - File shares are never checked for credentials - Many IT admins don’t know they have ADCS I could go on. On the bright side, I truly believe these are some of the most solvable IT security issues. If we can’t eliminate credentials from shares how do we expect to defend against more serious issues… Curious what else I see during internal pentest? I wrote more about this on my blog. Read more: spenceralessi.com/post/common-ac…







hydrogen Powered Car, 1,500 km range with a 5-second refill… sounds illegal.

Windows Vista on a CRT is a choice 🥴
















People do not believe this, but it is true. You can fix the company with Group Policy. You can fix everything. What you lack is second person to be there when you aren't. That is the precious meddle – without a price they will pay. They struck gold in you and think it's so easy.












