Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
Identity and access management | April 5, 2018How to find objects in Active Directory Active Directory (AD) administrators have always had to come up with unique ways of...
Identity and access management | July 27, 2016Powerful reporting of historical Active Directory activities Every Active Directory administrator has needed to get a report of access, activities, and...
Identity and access management | June 9, 2016Multiple computer logins for a single user Users often want to log in to many computers, without logging out of any. Microsoft and...