The architecture of a virtual machine differs vastly from traditional on-premises environments, and requires different data backup techniques and pre-backup operations. This post will explain some of the...
Approval workflow: Supervise self-service in Active Directory
Are you comfortable giving end users the power to update their own information in Active Directory? Definitely not! Are you willing to take on the responsibility of updating user information and managing users’ passwords? Not only is this a daunting task,...
The case for incident management in a SIEM system
Log360‘s latest incident management system is the perfect bridge between your incident detection and response processes. The feature comes in handy for security administrators and the various agents who...
[Free Webinars] Active Directory security and control
There are many moving parts of Active Directory, many of which are difficult, if not impossible, to manage and monitor. In our upcoming series of...
[Free Webinar] Awesome Active Directory password controls
Active Directory passwords are easy to crack. Since the password controls have not changed in over 15 years, attackers have been given ample opportunity to...
Save Active Directory reports in the file format you need
Administrators like CSV files. Auditors like HTML files. Executives like PDFs. We can go on and on. When dealing with Active Directory for generating reports,...
Empowering your IT help desk for Active Directory management
Imagine how efficient your help desk would be if it were empowered to deal with IT issues and manage Active Directory (AD) users from a...