Identity and access management | April 6, 2018Webinar: Negating insider threats Organizations need to be keenly aware of the actions their employees take, especially...
Identity and access management | April 5, 2018How to find objects in Active Directory Active Directory (AD) administrators have always had to come up with unique ways of...
Identity and access management | March 29, 2018Overcoming the shortcomings of native password policy controls in Active Directory With the constant threat of hackers trying to get their hands on your sensitive...
General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
Identity and access management | March 8, 2018Tracking Group Policy changes: Why you should look beyond native auditing Group Policy is undoubtedly one of the most powerful features of Active Directory. It...
Identity and access management | January 18, 2018The Microsoft Meltdown-Spectre patches…the real story Microsoft has released patches for the Meltdown and Spectre CPU vulnerabilities, but you...
Identity and access management | January 4, 2018A New Year's resolution for Windows administrators Did you make your personal New Year's resolution? How about your professional one? With...
Identity and access management | December 30, 20172017 IT recap—Things we learned 2017 was full of new information, new technologies, and lessons learned. As I toured the...
Identity and access management | December 28, 2017Preparing for the GDPR: Designing Active Directory groups One aspect of the GDPR is the fact that all users who have access to personal data must be...
Identity and access management | December 14, 2017GDPR preparation—Testing GDPR compliance auditing will be new to many organizations that have never been under a...
Identity and access management | December 7, 2017Common mistakes administrators make when applying GPOs – Part 1 Active Directory (AD) and Group Policy (GP) are essential components of most enterprises,...
Identity and access management | October 26, 2017Common mistakes administrators make when applying GPOs – Part 2 As a result of administrators not designing Active Directory (AD) well, further poor...