Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on in your organization. Our upcoming webinar, “Unraveling security incidents using event correlation,” is all about the power of event correlation. Join us on August …

Log360 1 min read

Monitoring service account password changes in Active Directory

Service accounts are dedicated Active Directory (AD) accounts that are used to manage Windows services and other network applications. These accounts have privileged access to applications, resources, and network access. Just like any other privileged account, it’s important to closely …

Active Directory 2 min read

Provisioning users in an Office 365 environment

Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning users for AD and Office 365 in bulk. User provisioning requires a systematic and streamlined …

Active Directory 1 min read

Securing zone levels in Internet Explorer

Managing and configuring Internet Explorer can be complicated. This is especially true when users meddle with the numerous settings it houses. Users may even unknowingly enable the execution of malicious codes. This highlights the importance of securing Internet Explorer.

In …

Active Directory 3 min read

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them, you need a proper incident management system that will not only ensure accountability but …

Log360 1 min read

Securing and protecting Active Directory and Windows networks webinar series

Recent attacks have proven that additional work needs to be done to secure our Windows environments. Active Directory, servers, users, privileges, vulnerabilities, etc. need to be configured correctly and monitored for changes. The issue that most organizations have with securing …

Active Directory 1 min read

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over on our forum, and you could win a $25 Amazon gift card.

Over …

Log360 1 min read

Free webinar: Learn how to protect your enterprise from ransomware 

What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems are running the latest software, while taking backups of your sensitive data …

DataSecurity Plus 1 min read

Free webinar: Tracking Active Directory attacks and user logons

Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used is a key aspect of securing access to network resources. As an administrator, you need …

Active Directory 1 min read