Strengthen your first line of defense against hackers

Passwords are the first line of defense between a hacker and your data. A decade ago, a password alone may have kept your data secure, but today, that’s no longer the case. The easiest way for a hacker to gain …

ADSelfService Plus 2 min read

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting your network, but with all the advantages comes the risk of cyberthreats. Cybercriminals are always developing new methods to breach networks, which means organizations are more susceptible …

Log360 1 min read

Tighten Windows security with two-factor authentication

A few decades ago, organizations were content knowing their network resources were password protected. With the increasing number of security breaches and digital crime, being password protected doesn’t carry as much weight as it once did.

According to Verizon’s 2018 

ADSelfService Plus 2 min read

Instantly restore AD objects to any previous version

There are multiple reasons for restoring an Active Directory (AD) object to a previous version, such as a script error, deletion of the object, or an accidental modification. Unfortunately, the native AD backup and restore utility tools from Microsoft fail …

Active Directory 2 min read

Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on in your organization. Our upcoming webinar, “Unraveling security incidents using event correlation,” is all about the power of event correlation. Join us on August …

Log360 1 min read

Monitoring service account password changes in Active Directory

Service accounts are dedicated Active Directory (AD) accounts that are used to manage Windows services and other network applications. These accounts have privileged access to applications, resources, and network access. Just like any other privileged account, it’s important to closely …

Active Directory 2 min read

Provisioning users in an Office 365 environment

Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning users for AD and Office 365 in bulk. User provisioning requires a systematic and streamlined …

Active Directory 1 min read

Securing zone levels in Internet Explorer

Managing and configuring Internet Explorer can be complicated. This is especially true when users meddle with the numerous settings it houses. Users may even unknowingly enable the execution of malicious codes. This highlights the importance of securing Internet Explorer.

In …

Active Directory 3 min read

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them, you need a proper incident management system that will not only ensure accountability but …

Log360 1 min read