Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But when alerts start stacking up and aren’t addressed promptly, important security concerns might go unnoticed …

Log360 3 min read Read

Lightweight Directory Access Protocol (LDAP) decoded for beginners

If you are a beginner on your Active Directory (AD) learning journey, then you must have stumbled upon the term LDAP. It’s quite possible that you feel a little lost trying to understand this concept. The objective of this blog …

Active Directory 3 min read Read

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of this series on Active Directory Domain Services. 

In this final and 10th part, we will look at one other crucial aspect of AD—Group …

Active Directory 4 min read Read

Active Directory sites in a nutshell


An Active Directory (AD) environment has things like forests, trees, domains, organization units, and objects. After growing acquainted with these concepts, the next step on this learning journey is to understand AD sites.

What are AD sites?

AD sites are …

Active Directory 4 min read Read

A practical approach to Active Directory Domain Services, Part 9: An AD reality check

Have you looked into some of the most well-known Active Directory (AD) attacks from around the world? Do you understand the nuances of these popular attacks and can you put the AD fundamentals you learned in the earlier parts of …

Active Directory 5 min read Read

How to supercharge your SIEM with the MITRE ATT&CK framework [Webinar]

The non-profit organization, MITRE, formulated the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework in 2013 to help organizations understand the attack pattern of threat actors. These attack patterns give us an indication of how an attacker enters a network, …

Log360 2 min read Read

A security analyst’s guide to understanding ransomware: The healthcare edition [E-book]

If you’re an IT security specialist, you’re probably familiar with the overwhelming number of cyberattacks that organizations have faced since the beginning of the pandemic. Attackers are constantly looking for ways to compromise an organization’s network, and upon gaining entry, …

Log360 2 min read Read

A practical approach to Active Directory Domain Services, Part 8: AD attacks

How and why do attackers target an organization’s Active Directory (AD)?

This blog, which is part 8 of the series A Practical approach to Active Directory Domain Services, will provide you with the answers. In this part, we will examine …

Active Directory 6 min read Read

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

Microsoft SharePoint Online is one of the most widely used content management platforms. Unfortunately, Proofpoint recently discovered that threat actors can abuse a feature in SharePoint Online and OneDrive for Business to encrypt all of your files and hold them …

RecoveryManager Plus 2 min read Read