Deleting unlinked Group Policy Objects

There are many moving parts with regard to Group Policy, which can make it difficult to know which areas of Group Policy you should focus...

Active Directory 2 min read Read

Six things to consider before choosing a log management solution

Budgeting for IT has always been a problematic topic of discussion when planning an organization’s total budget. Organizations typically want to buy cutting-edge security solutions at the lowest cost possible. But we all know there...

Log360 3 min read Read

Where’d you get those macarons? and other top questions from our AD one-on-ones

Last month we said you should be able to “spend less time worrying about your IT, and spend more time protecting it.” At our User Conference that we...

Active Directory 3 min read Read

Building a better help desk: Part 4, the key to an efficient help desk

For the past couple years, it had become routine for Nick to return home from work well past midnight. Like so many other help desk technicians,...

Active Directory 3 min read Read

Ransomware basics – Part 4

A cornerstone of any resistance to malware is user education. Administrators and other IT staff do not fully understand the complexities of computers, as computers...

Active Directory 1 min read Read

Building a better help desk: Part 2, secure permission management

Welcome to the next installment of our Building a better help desk blog series. This time we will be discussing how to improve your permission management. Data...

Active Directory 2 min read Read

Building a better help desk: Part 1, trouble-free user onboarding

You sit down at your desk on Monday morning and the first thing you see is an email from HR asking you to onboard a dozen new hires. Isn’t that just a great...

Active Directory 3 min read Read

Active Directory from A to Z!

Now that summer is over, we are delivering a variety of webinars all geared to increase the security, productivity, and overall stability of your Active...

Active Directory 1 min read Read

Adopting a SIEM solution? Here’s what you need to know

Cyberattacks have become an everyday affair, especially with the WannaCry attack and EquiFax breach making headline news recently. You might be asking yourself why cyberattacks have become more...

Log360 3 min read Read