Building a better help desk: Part 4, the key to an efficient help desk

For the past couple years, it had become routine for Nick to return home from work well past midnight. Like so many other help desk technicians,...

Active Directory 3 min read Read

Ransomware basics – Part 4

A cornerstone of any resistance to malware is user education. Administrators and other IT staff do not fully understand the complexities of computers, as computers...

Active Directory 1 min read Read

Building a better help desk: Part 2, secure permission management

Welcome to the next installment of our Building a better help desk blog series. This time we will be discussing how to improve your permission management. Data...

Active Directory 2 min read Read

Building a better help desk: Part 1, trouble-free user onboarding

You sit down at your desk on Monday morning and the first thing you see is an email from HR asking you to onboard a dozen new hires. Isn’t that just a great...

Active Directory 3 min read Read

Active Directory from A to Z!

Now that summer is over, we are delivering a variety of webinars all geared to increase the security, productivity, and overall stability of your Active...

Active Directory 1 min read Read

Adopting a SIEM solution? Here’s what you need to know

Cyberattacks have become an everyday affair, especially with the WannaCry attack and EquiFax breach making headline news recently. You might be asking yourself why cyberattacks have become more...

Log360 3 min read Read

Use a hybrid Exchange environment? Exchange Reporter Plus has got your back!

Cloud technology is becoming important for most companies, sometimes with entire businesses being run on the cloud. And let’s face it—the cloud has obvious advantages...

Exchange Reporter Plus 1 min read Read

Start streamlining GPO management with ADManager Plus

Wise are the administrators who create Active Directory (AD) objects and apply GPOs to them all at once. Even wiser are the administrators who achieve this without...

ADManager Plus 2 min read Read

Ransomware basics: Part 3

Even as I write this, I get the feeling that this blog series is too basic, but with the sheer number of attacks and recent...

Active Directory 1 min read Read