Identity and access management | December 20, 2018Minimizing membership in the local Administrators group on workstations If you have a long list of users with administrative rights, there's a good chance you've...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | December 6, 2018Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar] Active Directory is still vital for every organization that's staying on-premises or...
Identity and access management | November 29, 2018Monitoring Active Directory and Windows computers to detect attacks [Webinar] If organizations and administrators can be alerted when they're under attack, then they...
Identity and access management | November 15, 2018User behavior analytics for streamlined threat detection Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...
Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
General | October 25, 2018Application whitelisting using Software Restriction Policies Software Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory ...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1 Imagine you're an admin in a company that prides itself on its security practices, which...
Identity and access management | October 5, 2018Auditing and securing Active Directory webinar series With the number of data breaches increasing by the day, enterprises need to closely...
Identity and access management | September 13, 2018Instantly restore AD objects to any previous version There are multiple reasons for restoring an Active Directory (AD) object to a previous...
Identity and access management | August 9, 2018Provisioning users in an Office 365 environment Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and...
Identity and access management | August 2, 2018Securing zone levels in Internet Explorer Managing and configuring Internet Explorer can be complicated. This is especially true...