Dealing with three pathbreaking scenarios under the CCPA

The “right to be forgotten” is one of the new rights consumers will have under the CCPA.

“I’d like to pay with my credit card.”

“Sure! Let me have your card. Could I also get your full name, phone number, …

Log360 3 min read Read

How to create bulk users in Active Directory using a CSV file

Dear admin,

Please create Active Directory user accounts, cloud app accounts, home folders, mailboxes, and other requirements for the following new employees. Attached is the list of 100 new members.

Warm regards,


Scary thought?

When performed manually, creating Active …

ADManager Plus 2 min read Read

2FA based on OU/group membership in hybrid Active Directory

In a previous blog, we saw how two-factor authentication (2FA) secures access to cloud apps in hybrid AD. 2FA adds an extra level of security for applications, including Office 365, G Suite, and Salesforce, to protect sensitive information. With …

ADSelfService Plus 1 min read Read

Three critical password management blunders that hackers regularly exploit and best practices to replace them

IT teams often shoulder a number of important security-related responsibilities. It’s essentially up to them to ensure organizations’ networks are secure. For most organizations, comprehensive password management plays a vital role in securing their networks.

IT admins have to give …

ADSelfService Plus 2 min read Read

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with

Log360 2 min read Read

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators to monitor user logon activity to identify compromised accounts. UBA in ADAudit Plus can also help you track any unusual process on member …

ADAudit Plus 2 min read Read

Complying with NIST password guidelines

NIST Password Policy Guidelines

Passwords are the most widely used form of authentication across the globe and serve as the first line of defense to critical systems, applications, and data. In the past decade, however, they have attracted the ire of IT security experts …

ADSelfService Plus 3 min read Read

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360’s in-depth auditing capabilities, while part one explained how easy the product is to set up and use. But SIEM is about more than just auditing; …

Log360 3 min read Read

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit and secure. Having established the ease of Log360’s use and the breadth of its auditing scope, now we’ll examine some of the critical areas it …

Log360 3 min read Read