Identity and access management | December 4, 2014Securing Active Directory Delegations Challenge I have a challenge for you this week! After all, everyone loves a challenge. This one is...
EventLog Analyzer | December 3, 2014Solving a Cyber Crime Case Like Sherlock Holmes IT security managers lay a lot of emphasis on conducting log forensics investigations....
RecoveryManager Plus | December 2, 2014AD Admins: Are you prepared for the worst? One of Aesop's greatest fables, titled 'The Ant and the Grasshopper', teaches us a...
Identity and access management | November 27, 2014Active Directory Admins: Someone Has To Work Over Thanksgiving! Happy Thanksgiving! I hope everyone reading enjoys too much turkey, ham (my favorite),...
Identity and access management | November 21, 2014Auditing vs. Monitoring of Active Directory I just finished a class where I had both auditors and administrators in attendance. It...
ServiceDesk Plus | November 21, 2014ManageEngine Unveils Revamped Web UI for ServiceDesk Plus On-Demand In the life of a help desk technician, every second can matter. Those valuable seconds...
ServiceDesk Plus | November 20, 2014itSMF India National Conference 2014: Introductions, Conversations, and Intense Learning The annual conference of the IT service management forum (itSMF) happened in Bangalore,...
ServiceDesk Plus | November 18, 2014Help Desk Humor: Confessions from the People Running Your IT 1. The issue can be fixed in an hour or a day or a week based on your tone 2. I know...
Free Tools | November 14, 2014Free Tools that Keep Your Websites Reliable Yes, I admit it, I went to Google to learn about network and site reliability. And, guess...
Identity and access management | November 13, 2014Powershell Scripting and Disasters! So I am at a conference recently in Arizona and an attendee says to me that they used...
NetFlow Analyzer | November 12, 2014NetFlow on FortiOS Fortigate now supports NetFlow export by extending its monitoring capabilities to routers...
EventLog Analyzer | November 11, 20148 Log Management Habits of Highly Effective IT Security Managers In today’s business environment, data is the source that drives organizations in the...