Service accounts are dedicated Active Directory (AD) accounts that are used to manage Windows services and other network applications. These accounts have privileged access to applications, resources,...
Provisioning users in an Office 365 environment
Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning...
Securing zone levels in Internet Explorer
Managing and configuring Internet Explorer can be complicated. This is especially true when users meddle with the numerous settings it houses. Users may even unknowingly...
Webinar: Streamline incident management using SIEM
Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them,...
Securing and protecting Active Directory and Windows networks webinar series
Recent attacks have proven that additional work needs to be done to secure our Windows environments. Active Directory, servers, users, privileges, vulnerabilities, etc. need to...
Self-service password reset to the rescue
Every organization has its own password complexity requirements needed to ensure optimum security. Password complexity requirements force users to create strong, complex passwords that are...
Contest alert: Take part in the Log360 product pro challenge
We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over...
Free webinar: Learn how to protect your enterprise from ransomware
What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems...
Free webinar: Tracking Active Directory attacks and user logons
Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used...