Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they’re under attack, then they can take immediate action to negate the attack. The issue with alerts indicating attacks lies with knowing when actions are actually attacks or just normal behavior. Knowing …

Active Directory 1 min read

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive …

Log360 2 min read

Account lockout and management tools

Sometimes, when you get a call regarding a password reset, you can already guess who it’s from. Most organizations have one—that one employee who somehow manages to forget their password and gets locked out of their account more than everyone …

ADAudit Plus 2 min read

User behavior analytics for streamlined threat detection

Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely on technology to protect themselves, but attackers also use technology to find ways to get around these defenses. With artificial intelligence making its way into the …

Active Directory 2 min read

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local Administrators group can help strengthen your organization’s overall security. But with most businesses performing audits only once a year, unknown users can …

Active Directory 2 min read

Empower students to reset their passwords by themselves

Back to school Active Directory password management blues are a huge problem. If you’re an IT administrator at an educational institution, you know exactly what we’re talking about. At the start of the school year, the huge flow of new …

ADSelfService Plus 2 min read

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you’re an admin in a company that prides itself on its security practices, which includes using firewalls, IDP systems, and IPS systems. You have an employee who is a local administrator with highly sensitive data on their computer. This …

Active Directory 2 min read

Why password blacklisting is so important, and how to do it in Active Directory

Enable security measures against weak, common passwords

Passwords are still the most popular authentication method used to grant users access to critical business resources. According to the 2017 State of Authentication Report, more than half of US companies use only passwords to protect their intellectual property …

ADSelfService Plus 2 min read

Auditing and securing Active Directory webinar series

With the number of data breaches increasing by the day, enterprises need to closely evaluate their security infrastructure. Protecting systems and critical data, averting potential threats related to privileged access, and comprehensive event monitoring are essential areas that need to …

Active Directory 1 min read

Who’s responsible for the data held in Office 365? 

Microsoft Exchange Online allows users to communicate and work from anywhere at anytime without having to dedicate resources to maintain an on-premises Exchange environment. While Microsoft focuses on maintaining continual uptime, organizations are still responsible for backing up their Exchange …

RecoveryManager Plus 1 min read