Latest Posts

What is Windows 10 migration, and how do you implement Windows 7 to Windows 10 migration?

Microsoft has announced end of life (EOL) for Windows 7, meaning enterprises that want to continue receiving security updates and support will need to migrate their systems from Windows 7 to Windows 10 before January 14, 2020.

Although there are …

OS Deployer 3 min read Read

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively.

Data sprawl—defined as the proliferation …

General 3 min read Read

Exciting news about ServiceDesk Plus’ IT asset management module


We’re delighted to announce that ServiceDesk Plus, our flagship IT service management (ITSM) solution, received PinkVERIFY 2011 certification for its IT asset management (ITAM) processes. This adds to ServiceDesk Plus’ existing PinkVERIFY certifications for its incident management, request fulfillment, and …

ServiceDesk Plus 2 min read Read

OpManager bags gold—listed in Feedspot’s top networking blogs and sites to follow in 2019

Great news! The OpManager blog has ranked #15 in Feedspot’s top 100 networking blogs and websites to follow. This is a particularly big deal for ManageEngine as we focus on creating valuable content for IT admins, and to be recognized …

OpManager 1 min read Read

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators to monitor user logon activity to identify compromised accounts. UBA in ADAudit Plus can also help you track any unusual process on member …

ADAudit Plus 2 min read Read

Complying with NIST password guidelines

NIST Password Policy Guidelines

Passwords are the most widely used form of authentication across the globe and serve as the first line of defense to critical systems, applications, and data. In the past decade, however, they have attracted the ire of IT security experts …

ADSelfService Plus 3 min read Read

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360’s in-depth auditing capabilities, while part one explained how easy the product is to set up and use. But SIEM is about more than just auditing; …

Log360 3 min read Read

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised ones and is imaginatively named Agent Smith after the iconic villain in The Matrix.

Yet another malware attack targeting Android—so what’s the

Mobile Device Manager Plus 3 min read Read

Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flaws

The much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you’re a sysadmin, you probably know what this means for you: a week full of testing and deploying updates and troubleshooting patch failures, and then another week …

Patch Manager Plus 3 min read Read