Security operations center, Part 3: Finding your weakest link

Any organization with data assets is a possible target for an attacker. Hackers use various forms of advanced cyberattack techniques to obtain valuable company data;...

Log360 3 min read Read

Dangerous defaults that put your IT environment at risk: IT security under attack

In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security:...

Log360 5 min read Read

Free Active Directory management tools: Part 5 – Replication, domain controller roles, and monitoring

Replicate information between domain controllers (DCs), identify the roles assigned to the domain controllers in your Active Directory (AD) environment, and monitor your domain controllers...

ADManager Plus 2 min read Read

Free Active Directory management tools: Part 4 – Terminal Session Manager and Last Logon Finder

When your machine throws a “the server has exceeded the maximum number of allowed connections” message or when user accounts go stale, it’s up to...

ADManager Plus 2 min read Read

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks.  Often, they disguise...

Log360 3 min read Read

Free Active Directory management tools: Part 3 – Generating CSVs and querying Active Directory

Creating a CSV file containing all the required attributes of your entire workforce to perform bulk actions is not only time consuming, but often error-prone....

ADManager Plus 2 min read Read

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other...

Log360 4 min read Read

Free Active Directory management tools: Part 2 – Migrate mailbox data with ease

Have you ever wondered how organizations migrate inboxes, contacts, and calendars into new Microsoft 365 user accounts? Often, a PST migration tool is used to carry out...

ADManager Plus 2 min read Read

Securing a distributed workspace: A cybersecurity checklist for long-term remote work

One of the lasting changes brought about by the COVID-19 pandemic is that it forced organizations to rethink the concept of a workspace. As remote...

Log360 3 min read Read