ADSelfService Plus | August 9, 2019Azure AD Password Protection: The good, the bad, and the ugly People often use common words as their passwords so they don’t forget them. This practice...
ADAudit Plus | August 8, 2019Find out which of your employees pose the greatest security risk Among the different types of cyberattacks, insider threats are the hardest to track and...
ADManager Plus | July 31, 2019How to create bulk users in Active Directory using a CSV file Dear admin, Please create Active Directory user accounts, cloud app accounts, home folders...
ADSelfService Plus | July 30, 20192FA based on OU/group membership in hybrid Active Directory In a previous blog, we saw how two-factor authentication (2FA) secures access to cloud...
ADSelfService Plus | July 25, 2019Three critical password management blunders that hackers regularly exploit and best practices to replace them IT teams often shoulder a number of important security-related responsibilities. It's...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
ADSelfService Plus | July 16, 2019Complying with NIST password guidelines Passwords are the most widely used form of authentication across the globe and serve as...
RecoveryManager Plus | July 5, 2019Why litigation holds are not a viable alternative to backups Microsoft does not provide backup and recovery tools for its Office 365 services and has...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...
ADSelfService Plus | June 27, 2019Bringing SSO to hybrid Active Directory As enterprises transition to a hybrid Active Directory (AD) environment, it’s important...
Identity and access management | June 10, 2019[Infographic] Top three approaches to dealing with account lockouts In the previous blog of this series, "[Infographic]Three tips to simplify Active Directory...