• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:custom

How to find objects in Active Directory

Identity and access management | April 5, 2018

How to find objects in Active Directory

Active Directory (AD) administrators have always had to come up with unique ways of...

Secure inactive Active Directory users

ADManager Plus | June 23, 2016

Secure inactive Active Directory users

There is no formula that tells an Active Directory administrator when or how to perform...

Identity and access management | June 11, 2015

Windows Log Reporting Like Never Before!

ADAudit Plus is an amazing tool and does wonders for all admins, security professionals,...

Securing Active Directory: Group Membership Alerts

Identity and access management | April 16, 2015

Securing Active Directory: Group Membership Alerts

In our last installment, I showed you how you can analyze the current status of all of...

EventLog Analyzer | October 21, 2009

Do you know about Mouse gestures on Eventlog Analyzer v.6?

Simple user-friendly features make our application as one of the most preferred one in the...