IT Security | March 16, 2018GDPR prep steps—Part 1 The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you...
Identity and access management | December 28, 2017Preparing for the GDPR: Designing Active Directory groups One aspect of the GDPR is the fact that all users who have access to personal data must be...
Identity and access management | October 26, 2017Common mistakes administrators make when applying GPOs – Part 2 As a result of administrators not designing Active Directory (AD) well, further poor...
Identity and access management | August 31, 2017Ransomware basics: Part 2 In our first installment, we discussed the importance of backing up your data. Without a...
Identity and access management | May 19, 2016Active Directory SACL reporting ManageEngine has stressed the importance of monitoring and alerting on Active Directory...
ADManager Plus | February 18, 2016Reporting on folder access permissions [embed]https://www.youtube.com/watch?v=LzVmv_NE364&feature=youtu.be[/embed] Read more...
ADManager Plus | February 11, 2016Managing folder permissions from a central location [embed]https://www.youtube.com/watch?v=lUwFAed_bkc&feature=youtu.be[/embed] Try out...
ADManager Plus | December 4, 2015Securing content located in a distributed file system A distributed file system (DFS) is used to “mask” the location of content that is shared...
ADManager Plus | March 26, 2015Establishing an Active Directory security baseline is essential After my initial Global Active Directory Seminar world tour, I came back with one key...
Identity and access management | December 4, 2014Securing Active Directory Delegations Challenge I have a challenge for you this week! After all, everyone loves a challenge. This one is...
ADManager Plus | July 18, 2014Unveiling your Active Directory delegations Ever since Microsoft released Active Directory in 2000, there has been an option referred...