Tired of troubleshooting Active Directory?


Every Active Directory administrator around the world has the same issue. There is always someone else who can modify Active Directory! When incorrect changes occur, some issue usually arises from the change. A service fails, a user can not access a resource, Group Policy fails to apply, etc.

In those situations, it can be difficult, if not impossible, to figure out the root cause without in-depth troubleshooting. After you have fixed the problem, it would be nice to know who caused the incorrect change and what the change was.

Instead of troubleshooting and guessing to solve the problem, wouldn’t you prefer to have a solution that informs you of the change in real-time so you can immediately take actio…

Good-bye 2015: Final week of year tasks for Active Directory


As administrators, we are the employees that rarely get to take time off work, as someone needs to ensure that the network is up and running. Sure, there is no one in the office, as everyone is taking vacation, but you must still come in and take care of the network. Go ahead and play your games, that is not an issue for me. However, all year you ask, “When am I going to have time to perform the basic duties for Active Directory?” Well, now is a perfect time!

Here are some basics that you should ensure are in place as we leave 2015 and head into 2016.

  1. Make a full backup of Active Directory – You can use the built-in backup or the rock solid backup solution you have in place. No matter what, be sure to include all aspects of Act

Monitor Files and Folders Like Never Before


Over and over, I get the same question from many admins and security professionals regarding the monitoring of files and folders. Although it can be complicated to address, I completely understand the issues, which are related to compliance and overall access. In reality, it comes down to monitoring the integrity of the company data.

Microsoft, of course, provides a file integrity solution, which will help you learn about changes to your system and program files. However, if you have information (data) that is not located in these places, nor shared, complications can arise. Well, ManageEngine has the perfect solution for you. We help you track ANY folder, regardless of it being  system or shared file. He

Auditing vs. Monitoring of Active Directory


I just finished a class where I had both auditors and administrators in attendance. It was one of the best groups I have had for that reason. From the class I learned that it is not always “known” what the difference is between auditing and monitoring. Auditing is performed by auditors and monitoring is typically performed by administrators. There is only a slight difference between the two, but the difference is rather important and can make a world of difference when it’s time to report on your log data.. 

Auditing is both a technology and a role. The technology is built into every Windows computer and has been for years. Going back to Windows NT, Microsoft has provided auditing. Domain control

IT Security and Auditing Framework – A Glass Half Full or Half Empty?


Log Management, Compliance Reporting and SIEM

Corporate islands with no connectivity to the external world and/or employees seeking permission to share company critical information with an outsider are not options that ensure protection from information thefts. Not a day goes by without a security breach or espionage attempt in the media. It doesn’t matter whether it’s an internal or external hack caused by a deliberate or inadvertent action. The IT guy is made accountable for the security gaps and is asked to revisit the policies to ensure that such incidents don’t recur.

We can all say thanks to the built-in logging mechanism in devices, systems and applications, which help track e…

PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2]


[In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In this post, we’ll discuss the requirements in depth.]

When a customer presents a payment card to a merchant at the point of sale, a chain of operations is triggered in the background. The request-approval process happens across software applications, wireless devices, firewalls, routers, switches, storage devices, telecommunication systems, and a host of other applications. Therefore, your data’s security is directly dependent upon the security of all these devices and applications.

Although several authentication mechanisms are emerging, passwords are still the most prominent mode of authenticatio…

Can your organization be Hack Immune?


This past few months witnessed a record breaking global level of malware threats and APTs (Advanced Persistent Threat) that put the mightiest of Enterprises’ security at jeopardy! Since December 2009, post the Google Aurora attack, the way Enterprises see APTs has changed forever. Even the last bit of resistance was wiped out when World Bank, Morgan Stanley was taken down by such threats too. The challenge with this type of security attack is the manner in which Enterprise IT Security is hacked – slow and disguised.

Not to mention the plethora of ‘zero day’ attacks lead by hacktivists (Eldarwood gang, Anonymous to name a few) that shake the very foundation of data security of the Enterprise with …

Software asset management is not so “soft” and “smooth”


“Choco bloc” is the idiom I think of when it comes to asset tracking (Hardware & Software). Tracking the assets information is not an easy thing to do especially software management and license monitoring. Enterprises need to look at three different aspects of software management – Software Metering, Software Compliance, and Prohibited Software.

Software Metering – You will purchase a lot of software that is required for your enterprise. But you need to track the usage metrics since not every software in enterprise is utilized 100%. Tracking the software usage helps you realize the used and unused software that can help you to take an informed decision. This decision can save your costs o…