• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:computer

Monitoring users for unusual file activity

Identity and access management | December 19, 2018

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

Identity and access management | November 1, 2018

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local...

How to find objects in Active Directory

Identity and access management | April 5, 2018

How to find objects in Active Directory

Active Directory (AD) administrators have always had to come up with unique ways of...

Powerful reporting of historical Active Directory activities

Identity and access management | July 27, 2016

Powerful reporting of historical Active Directory activities

Every Active Directory administrator has needed to get a report of access, activities, and...

Multiple computer logins for a single user

Identity and access management | June 9, 2016

Multiple computer logins for a single user

Users often want to log in to many computers, without logging out of any. Microsoft and...