• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:azure

Minimizing membership in the local Administrators group on workstations

Identity and access management | December 20, 2018

Minimizing membership in the local Administrators group on workstations

If you have a long list of users with administrative rights, there's a good chance you've...

Monitoring users for unusual file activity

Identity and access management | December 19, 2018

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...

Identity and access management | December 6, 2018

Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar]

Active Directory is still vital for every organization that's staying on-premises or...

Identity and access management | November 29, 2018

Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they're under attack, then they...

Identity and access management | November 15, 2018

User behavior analytics for streamlined threat detection

Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

Identity and access management | November 1, 2018

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local...

Application whitelisting using Software Restriction Policies

General | October 25, 2018

Application whitelisting using Software Restriction Policies

Software Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory ...

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Identity and access management | October 11, 2018

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you're an admin in a company that prides itself on its security practices, which...

Identity and access management | October 5, 2018

Auditing and securing Active Directory webinar series

With the number of data breaches increasing by the day, enterprises need to closely...

Instantly restore AD objects to any previous version

Identity and access management | September 13, 2018

Instantly restore AD objects to any previous version

There are multiple reasons for restoring an Active Directory (AD) object to a previous...

Provisioning users in an Office 365 environment

Identity and access management | August 9, 2018

Provisioning users in an Office 365 environment

Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and...

Securing zone levels in Internet Explorer

Identity and access management | August 2, 2018

Securing zone levels in Internet Explorer

Managing and configuring Internet Explorer can be complicated. This is especially true...

Page 2 of 8«1234...»Last »