Keeping up with compliance regulations like the GDPR and CCPA – Free webinar

The EU’s GDPR and California’s CCPA are two of the world’s most prominent data regulations. Similar laws have been passed in several countries, including Japan, Thailand, and Australia. Still others, like India, are in the process of drafting their own …

Log360 1 min read Read

Managing updates to local cached credentials for remote users in a hybrid Active Directory environment

Among the many issues remote users face, forgotten passwords can be a significant roadblock to productivity, as they require help from an administrator. When a user logs on to an Active Directory (AD) domain, Windows securely caches the domain credentials …

ADSelfService Plus 2 min read Read

Active Directory authentication protocols and security risks

For organizations to maintain security and reduce their threat exposure, it’s critical to understand the vulnerabilities and challenges of Windows authentication protocols. For instance, the inherent flaws of the LM and NTLM protocols render them susceptible to simple attacks. It’s …

Active Directory 2 min read Read

Zooming in on UEBA: Answering the “what” and the “how” 

What is UEBA?

User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of the users and entities that belong to an enterprise network. …

Log360 3 min read Read

Azure AD Password Protection: The good, the bad, and the ugly

People often use common words as their passwords so they don’t forget them. This practice impacts security severely, making it easy for hackers to easily breach accounts by guessing these common passwords. Microsoft’s Azure AD Password Protection is a feature …

ADSelfService Plus 3 min read Read

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges.

Traditional SIEM solutions …

ADAudit Plus 2 min read Read

Dealing with three pathbreaking scenarios under the CCPA

The “right to be forgotten” is one of the new rights consumers will have under the CCPA.

“I’d like to pay with my credit card.”

“Sure! Let me have your card. Could I also get your full name, phone number, …

Log360 3 min read Read

How to create bulk users in Active Directory using a CSV file

Dear admin,

Please create Active Directory user accounts, cloud app accounts, home folders, mailboxes, and other requirements for the following new employees. Attached is the list of 100 new members.

Warm regards,


Scary thought?

When performed manually, creating Active …

ADManager Plus 2 min read Read