• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:ADAudit

Detecting changes in privileged accounts in Azure AD

Identity and access management | May 23, 2019

Detecting changes in privileged accounts in Azure AD

Monitoring and protecting privileged accounts is paramount because failure to do so can...

Monitoring users for unusual file activity

Identity and access management | December 19, 2018

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...

Identity and access management | November 15, 2018

User behavior analytics for streamlined threat detection

Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

Identity and access management | November 1, 2018

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local...

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Identity and access management | October 11, 2018

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you're an admin in a company that prides itself on its security practices, which...

Use change monitoring to never let a change go unnoticed in Active Directory

Identity and access management | April 19, 2018

Use change monitoring to never let a change go unnoticed in Active Directory

Active Directory relies on services distributed across many, interdependent devices in...

Identity and access management | March 8, 2018

Tracking Group Policy changes: Why you should look beyond native auditing

Group Policy is undoubtedly one of the most powerful features of Active Directory. It...

Identity and access management | December 28, 2017

Preparing for the GDPR: Designing Active Directory groups

One aspect of the GDPR is the fact that all users who have access to personal data must be...

Identity and access management | August 24, 2017

Ransomware basics: Part 1

There are many articles on ransomware. Many are trying to convince you that if you buy the...

Showing hidden shares in ADAudit Plus

Identity and access management | January 19, 2017

Showing hidden shares in ADAudit Plus

ADAudit Plus does not show hidden shares, those that end with a $, by default. However,...

Multiple computer logins for a single user

Identity and access management | June 9, 2016

Multiple computer logins for a single user

Users often want to log in to many computers, without logging out of any. Microsoft and...

Identity and access management | December 10, 2015

Active Directory end-of-year tasks

As we get close to the end of the 2015 calendar year, I feel it's important for all Active...

Page 1 of 212»Last »