Search results for: applications manager

IT infrastructure monitoring

IT infrastructure monitoring as a whole picture is about keeping track of the health and performance of all the IT assets in a network environment....

OpManager 5 min read Read

North Korean hackers taint PuTTY SSH client with malware

Mandiant has reported an instance in which a group of North Korean hackers tainted the PuTTY SSH client through a malicious ISO package. The issue...

General 3 min read Read

Happy IT Professionals Day! A huge shoutout to all the IT pros

It’s the coolest day of the year again—time to honor and celebrate the people who work behind the scenes to keep our businesses running: IT...

General 3 min read Read

September 2022 Patch Tuesday comes with fixes for 63 vulnerabilities, including 2 zero days

Patch Tuesday is here again, this time with a plethora of updates. September 2022’s Patch Tuesday lists fixes for 63 vulnerabilities, including two zero days....

Patch Manager Plus 4 min read Read

August 2022 Patch Tuesday comes with fixes for 121 vulnerabilities, including 2 zero days

Patch Tuesday is here again, this time with a plethora of updates. August 2022’s Patch Tuesday lists fixes for 121 vulnerabilities, including two zero days....

Patch Manager Plus 4 min read Read

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of this series on Active Directory Domain Services.  In...

Active Directory 4 min read Read

July 2022 Patch Tuesday comes with fixes for 84 vulnerabilities, including 1 zero day

Patch Tuesday is here again, this time with a plethora of updates. July 2022’s Patch Tuesday lists fixes for 84 vulnerabilities, including one zero day....

Patch Manager Plus 4 min read Read

A Microsoft SharePoint Online feature could be the cause of the next ransomware attack

Microsoft SharePoint Online is one of the most widely used content management platforms. Unfortunately, Proofpoint recently discovered that threat actors can abuse a feature in SharePoint...

RecoveryManager Plus 2 min read Read

What to look for in a Windows network monitoring tool

Monitoring the Windows devices in a network is difficult yet essential since the devices are tasked with the critical functioning of the network. The challenges...

OpManager 4 min read Read