Password sync in hybrid Active Directory

On any given day, employees toggle between multiple business-critical applications, both on-premises and cloud-based, requiring them to remember different passwords. This often leads to password fatigue and, subsequently, a surge in password-related help desk calls.

Although IT administrators can manually …

ADSelfService Plus 1 min read Read

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at unforeseen security attack scenarios, and discover how user and entity …

Log360 3 min read Read

NTLM vulnerabilities that make you susceptible to relay attacks

In June 2019, Microsoft released patches for two critical vulnerabilities that were discovered in it’s NT LAN Manager (NTLM) protocol suite affecting all versions. These vulnerabilities let attackers execute malicious code on any Windows machine remotely, or even authenticate to …

ADAudit Plus 2 min read Read

Why this renowned IT expert believes that ManageEngine’s IAM solution is better than native AD tools for SMBs

Martin Kuppinger is the founder and principal analyst at KuppingerCole, one of the industry’s leading analyst firms. With over 25 years of experience in the IT industry and over 50 books published related to the field, Kuppinger has plenty of

AD360 1 min read Read

How to make password management more secure and efficient

Among the various tasks that IT administrators carry out on a daily basis, password management takes center stage. Gartner estimates that about a third of help desk calls are concerning password resets and account lockouts. While attending to these calls …

ADSelfService Plus 1 min read Read

There’s more than one way to get admin privileges

Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of expansion. With the evolution of AD, the attack landscape has also evolved. Attacks have become …

General 2 min read Read

Keeping up with compliance regulations like the GDPR and CCPA – Free webinar

The EU’s GDPR and California’s CCPA are two of the world’s most prominent data regulations. Similar laws have been passed in several countries, including Japan, Thailand, and Australia. Still others, like India, are in the process of drafting their own …

Log360 1 min read Read

Managing updates to local cached credentials for remote users in a hybrid Active Directory environment

Among the many issues remote users face, forgotten passwords can be a significant roadblock to productivity, as they require help from an administrator. When a user logs on to an Active Directory (AD) domain, Windows securely caches the domain credentials …

ADSelfService Plus 2 min read Read

Active Directory authentication protocols and security risks

For organizations to maintain security and reduce their threat exposure, it’s critical to understand the vulnerabilities and challenges of Windows authentication protocols. For instance, the inherent flaws of the LM and NTLM protocols render them susceptible to simple attacks. It’s …

Active Directory 2 min read Read