Azure AD Password Protection: The good, the bad, and the ugly

People often use common words as their passwords so they don’t forget them. This practice impacts security severely, making it easy for hackers to easily breach accounts by guessing these common passwords. Microsoft’s Azure...

ADSelfService Plus 3 min read Read

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to...

ADAudit Plus 2 min read Read

Dealing with three pathbreaking scenarios under the CCPA

The “right to be forgotten” is one of the new rights consumers will have under the CCPA. “I’d like to pay with my credit card.”...

Log360 3 min read Read

How to create bulk users in Active Directory using a CSV file

Dear admin, Please create Active Directory user accounts, cloud app accounts, home folders, mailboxes, and other requirements for the following new employees. Attached is the list of 100 new members....

ADManager Plus 2 min read Read

2FA based on OU/group membership in hybrid Active Directory

In a previous blog, we saw how two-factor authentication (2FA) secures access to cloud apps in hybrid AD. 2FA adds an extra level of security...

ADSelfService Plus 1 min read Read

Three critical password management blunders that hackers regularly exploit and best practices to replace them

IT teams often shoulder a number of important security-related responsibilities. It’s essentially up to them to ensure organizations’ networks are secure. For most organizations, comprehensive password...

ADSelfService Plus 2 min read Read

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of...

Log360 2 min read Read

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators to monitor user logon activity to identify compromised accounts....

ADAudit Plus 2 min read Read