Identity and access management | May 23, 2019Detecting changes in privileged accounts in Azure AD Monitoring and protecting privileged accounts is paramount because failure to do so can...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | November 15, 2018User behavior analytics for streamlined threat detection Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...
Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1 Imagine you're an admin in a company that prides itself on its security practices, which...
Identity and access management | April 19, 2018Use change monitoring to never let a change go unnoticed in Active Directory Active Directory relies on services distributed across many, interdependent devices in...
Identity and access management | March 8, 2018Tracking Group Policy changes: Why you should look beyond native auditing Group Policy is undoubtedly one of the most powerful features of Active Directory. It...
Identity and access management | December 28, 2017Preparing for the GDPR: Designing Active Directory groups One aspect of the GDPR is the fact that all users who have access to personal data must be...
Identity and access management | August 24, 2017Ransomware basics: Part 1 There are many articles on ransomware. Many are trying to convince you that if you buy the...
Identity and access management | January 19, 2017Showing hidden shares in ADAudit Plus ADAudit Plus does not show hidden shares, those that end with a $, by default. However,...
Identity and access management | June 9, 2016Multiple computer logins for a single user Users often want to log in to many computers, without logging out of any. Microsoft and...
Identity and access management | December 10, 2015Active Directory end-of-year tasks As we get close to the end of the 2015 calendar year, I feel it's important for all Active...