5 key features any Active Directory solution must have [E-book]

Active Directory disasters come in many forms. Microsoft does provide a native backup and recovery utility, but it falls short of providing complete protection against...

RecoveryManager Plus 1 min read Read

Bring down data storage costs by getting rid of obsolete data [Savings estimator]

Redundant, obsolete, and trivial (ROT) data refers to information housed in data repositories that is either not in use or not needed in current business operations. These are...

DataSecurity Plus 3 min read Read

3 must-dos for IT admins in healthcare organizations to secure patients’ data and privacy

Since the beginning of the pandemic, there has been an increase in the volume of sensitive patient data being stored and processed by healthcare organizations....

AD360 2 min read Read

What causes repeated account lockouts and how to resolve them

A stringent account lockout policy is vital to derail password guessing and brute-force attacks but it also runs the risk of locking out legitimate users...

ADAudit Plus 3 min read Read

13 spooky security threats that happened in 2021

Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a Halloween costume and got an email...

Log360 6 min read Read

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome is the fact that many of them are exploiting Active Directory (AD), a crucial...

AD360 2 min read Read

Microsoft’s shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book]

  Use of Azure AD and Microsoft 365 has steadily increased over the past few years, and the adoption rate has skyrocketed due to the...

RecoveryManager Plus 1 min read Read

Enhance ADManager Plus security using the Product Security Hardening feature

Product Security Hardening is an option that has been added to ADManager Plus in version 7116. With this option, you can configure security-specific settings of...

ADManager Plus 2 min read Read

[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers’ phishing attack

NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. Known for its undetectable attack techniques, NOBELIUM’s recent malicious...

M365 Manager Plus 1 min read Read