Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1 Imagine you're an admin in a company that prides itself on its security practices, which...
General | June 1, 2017Stay on top of your security game with our free workshops With the recent bout of security attacks stemming from leaked NSA vulnerabilities,...
General | January 30, 20178 New Year's resolutions for system administrators The new year is here and 2016 is a distant memory. You may have a number of personal...
General | January 23, 2017Resolve to be a SysAdmin superhero in 2017 The holidays are over, second and third helpings of home-cooked meals long forgotten, and...
Identity and access management | September 1, 2016Auditors vs. admins As security becomes more and more important each day, there is a need for the IT community...
Identity and access management | January 7, 2016Windows Active Directory security hardening: Honeypot #1 To catch an attack and an attacker, both the administrator and the organization need to be...
Identity and access management | December 18, 2014Tracking Administrative Group Modifications Security of elevated privileged access is becoming more and more important with every...
Identity and access management | November 27, 2014Active Directory Admins: Someone Has To Work Over Thanksgiving! Happy Thanksgiving! I hope everyone reading enjoys too much turkey, ham (my favorite),...
ADManager Plus | June 27, 2014Going Deep With Nested Group Audits It is one of the top three most complex areas of auditing: nested groups! You know, you...