Provisioning users in an Office 365 environment

Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning users for AD and Office 365 in bulk. User provisioning requires a systematic and streamlined …

Active Directory 1 min read

Securing zone levels in Internet Explorer

Managing and configuring Internet Explorer can be complicated. This is especially true when users meddle with the numerous settings it houses. Users may even unknowingly enable the execution of malicious codes. This highlights the importance of securing Internet Explorer.

In …

Active Directory 3 min read

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them, you need a proper incident management system that will not only ensure accountability but …

Log360 1 min read

Securing and protecting Active Directory and Windows networks webinar series

Recent attacks have proven that additional work needs to be done to secure our Windows environments. Active Directory, servers, users, privileges, vulnerabilities, etc. need to be configured correctly and monitored for changes. The issue that most organizations have with securing …

Active Directory 1 min read

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over on our forum, and you could win a $25 Amazon gift card.

Over …

Log360 1 min read

Free webinar: Learn how to protect your enterprise from ransomware 

What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems are running the latest software, while taking backups of your sensitive data …

DataSecurity Plus 1 min read

Free webinar: Tracking Active Directory attacks and user logons

Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used is a key aspect of securing access to network resources. As an administrator, you need …

Active Directory 1 min read

Selecting an IAM solution that fits your enterprise

When it comes to managing the identity and access of users, Active Directory leaves a few gaps. These gaps can impact everything from user productivity to corporate security. This is where third-party identity and access management (IAM) tools come into …

Active Directory 2 min read

Why password complexity is so important for your organization

Passwords are a big part of your Active Directory (AD) environment. As an administrator, you have to enforce strict password policies to ensure better security for your AD environment, but these policies are often difficult for users to adhere to. …

Active Directory 2 min read