How to make password management more secure and efficient

Among the various tasks that IT administrators carry out on a daily basis, password management takes center stage. Gartner estimates that about a third of help desk calls are concerning password resets and account lockouts. While attending to these calls …

ADSelfService Plus 1 min read Read

There’s more than one way to get admin privileges

Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of expansion. With the evolution of AD, the attack landscape has also evolved. Attacks have become …

General 2 min read Read

Keeping up with compliance regulations like the GDPR and CCPA – Free webinar

The EU’s GDPR and California’s CCPA are two of the world’s most prominent data regulations. Similar laws have been passed in several countries, including Japan, Thailand, and Australia. Still others, like India, are in the process of drafting their own …

Log360 1 min read Read

Managing updates to local cached credentials for remote users in a hybrid Active Directory environment

Among the many issues remote users face, forgotten passwords can be a significant roadblock to productivity, as they require help from an administrator. When a user logs on to an Active Directory (AD) domain, Windows securely caches the domain credentials …

ADSelfService Plus 2 min read Read

Active Directory authentication protocols and security risks

For organizations to maintain security and reduce their threat exposure, it’s critical to understand the vulnerabilities and challenges of Windows authentication protocols. For instance, the inherent flaws of the LM and NTLM protocols render them susceptible to simple attacks. It’s …

Active Directory 2 min read Read

Zooming in on UEBA: Answering the “what” and the “how” 

What is UEBA?

User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of the users and entities that belong to an enterprise network. …

Log360 3 min read Read

Azure AD Password Protection: The good, the bad, and the ugly

People often use common words as their passwords so they don’t forget them. This practice impacts security severely, making it easy for hackers to easily breach accounts by guessing these common passwords. Microsoft’s Azure AD Password Protection is a feature …

ADSelfService Plus 3 min read Read

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges.

Traditional SIEM solutions …

ADAudit Plus 2 min read Read