Identity and access management | June 10, 2019[Infographic] Top three approaches to dealing with account lockouts In the previous blog of this series, "[Infographic]Three tips to simplify Active Directory...
Identity and access management | May 23, 2019Detecting changes in privileged accounts in Azure AD Monitoring and protecting privileged accounts is paramount because failure to do so can...
ADAudit Plus | February 25, 2019Quick tips to ensure your Azure AD is safe from threats Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...
Identity and access management | February 14, 2019File server auditing: Excluding certain files and file types In order to improve the efficiency of audit reports, administrators auditing a file server...
Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
Identity and access management | October 5, 2018Auditing and securing Active Directory webinar series With the number of data breaches increasing by the day, enterprises need to closely...
IT Security | August 15, 2018Simplifying security auditing, Part 1: Regularly reviewing server activity Everyone knows about the importance of log management in IT security. Yet, organizations...
Identity and access management | June 7, 2018Selecting an IAM solution that fits your enterprise When it comes to managing the identity and access of users, Active Directory leaves a few...
General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
Identity and access management | September 21, 2017Active Directory from A to Z! Now that summer is over, we are delivering a variety of webinars all geared to increase...
Identity and access management | June 29, 2017Get notified when a folder is shared on servers and workstations We all know that sharing a folder on a server opens up an entry point to that server. Even...
Identity and access management | September 1, 2016Auditors vs. admins As security becomes more and more important each day, there is a need for the IT community...