Five reasons to choose Log360, part 1: User-friendly deployment and UI

SIEM solutions are a must-have in any organization’s security toolkit. They allow you to analyze events from your network, gain actionable insights into network activity, and detect and mitigate data breaches and other security incidents, all while remaining compliant with …

Log360 2 min read Read

[Infographic] Top three approaches to dealing with account lockouts

In the previous blog of this series, “[Infographic]Three tips to simplify Active Directory compliance and auditing”, we discussed the tips and tricks to achieve compliance. In this blog, let’s discuss what admins must focus on when dealing with account …

Active Directory 2 min read Read

[Infographic]Three tips to simplify Active Directory compliance and auditing

In the previous blog of this series, “[Infographic] Still manually onboarding users into Active Directory? There’s a better way!“, we discussed the tips and tricks to onboard users into Active Directory. In this blog, let’s discuss what admins …

ADAudit Plus 2 min read Read

[Infographic] Top three password-related issues that plague IT admins

Managing user identities is an everyday affair for an IT administrator. However, in large organizations with complex IT hierarchies, things spiral out of control very quickly. Below are the top three password-related problems that plague IT admins.

1) Password reset

ADSelfService Plus 2 min read Read

Two-factor authentication for secure access to cloud apps in hybrid AD


In an earlier post, we dealt with the benefits of single sign-on (SSO) for cloud apps in hybrid Active Directory (AD). While SSO is good in the sense that it simplifies user access to multiple cloud apps, it …

Active Directory 1 min read Read

Empower users to securely reset passwords from the login screen of their machines

With so many rapid technological advances, today’s employees break all the usual work conventions. They work remotely, operate during non-business hours, and use their mobile devices to complete business tasks. When these users forget their passwords, they need to be …

ADSelfService Plus 1 min read Read

Simplify management and reporting of share and NTFS permissions

File servers are an essential component of every organization’s IT infrastructure. Any unintended permission changes on business-critical file servers can compromise data, causing hefty noncompliance fines and business disruptions.

 The first step in preventing privilege abuse is tracking the permissions …

ADManager Plus 1 min read Read

Learn Active Directory and IT security management best practices and more at our Houston seminar

ManageEngine’s Cybersecurity and hybrid identity management Seminar is all set to return to Houston, TX on June 4. We have fond memories of our 2018 Houston seminar, as our attendees were extremely engaged, and many benefited from one-on-one discussions with …

Active Directory 1 min read Read