User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts...
Mapping drives using Group Policy preferences
For years, IT administrators have been relying on logon scripts for mapping users’ network drives in a Windows domain environment. However, more recently, administrators have found an effective alternative in Group Policy preferences and...
Cleaning up inactive user accounts in Active Directory
When employees leave organizations, their user accounts often remain in Active Directory (AD) without gathering much attention. The passwords on these accounts remain unchanged when no longer in use, which could lead...
Notify users about their random passwords via SMS
In a previous blog, we saw why generating random passwords is key to securing new user accounts for your Active Directory environment. But random passwords for new user accounts also need to...
Combating threats with UEBA: Money matters
In this four-part series, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at...
Onboarding and offboarding users in hybrid AD has never been easier
By 2020, Gartner predicts that 90 percent of organizations will adopt hybrid identity infrastructures. Hybrid Active Directory (AD) environments let you leverage the powerful on-premises AD while harnessing the...
Secure newly created user accounts with random passwords
Whether creating a new user in Active Directory (AD) or resetting a password, there are times when administrators need to assign users a randomly-generated password....
Yet another Exchange Online incident: All about EX191574
On September 25, 2019, Exchange Online users began facing an issue that prevents RTF emails including attachments from being sent to external domains. According to...
Announcing our weekly podcast series—subscribe now and start listening
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We’re thrilled...