Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they’re under attack, then they can take immediate action to negate the attack. The issue with alerts...

Active Directory 1 min read Read

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s...

Log360 2 min read Read

Account lockout and management tools

.whatSection a { background: #e9142b; border-radius: 3px; color: #fff; font-size: 14px; font-weight: 300; padding: 15px 40px; text-decoration: none; transition: all 1s; }

ADAudit Plus 2 min read Read

User behavior analytics for streamlined threat detection

Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely on technology to protect themselves, but attackers also use technology to...

Active Directory 2 min read Read

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local Administrators group can help strengthen your organization’s overall...

Active Directory 2 min read Read

Empower students to reset their passwords by themselves

Back to school Active Directory password management blues are a huge problem. If you’re an IT administrator at an educational institution, you know exactly what we’re talking about. At...

ADSelfService Plus 2 min read Read

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you’re an admin in a company that prides itself on its security practices, which includes using firewalls, IDP systems, and IPS systems. You have...

Active Directory 2 min read Read

Why password blacklisting is so important, and how to do it in Active Directory

Passwords are still the most popular authentication method used to grant users access to critical business resources. According to the 2017 State of Authentication Report, more than half of US companies use only passwords...

ADSelfService Plus 2 min read Read

Auditing and securing Active Directory webinar series

With the number of data breaches increasing by the day, enterprises need to closely evaluate their security infrastructure. Protecting systems and critical data, averting potential...

Active Directory 1 min read Read