Identity and access management | February 14, 2019File server auditing: Excluding certain files and file types In order to improve the efficiency of audit reports, administrators auditing a file server...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | August 31, 2017Ransomware basics: Part 2 In our first installment, we discussed the importance of backing up your data. Without a...
Identity and access management | August 24, 2017Ransomware basics: Part 1 There are many articles on ransomware. Many are trying to convince you that if you buy the...
Identity and access management | June 16, 2017Save Active Directory reports in the file format you need Administrators like CSV files. Auditors like HTML files. Executives like PDFs. We can go...
Identity and access management | July 14, 2016Windows security: Now is the time to take action ManageEngine is dedicated to helping organizations better understand, configure, and...
ADManager Plus | February 18, 2016Reporting on folder access permissions [embed]https://www.youtube.com/watch?v=LzVmv_NE364&feature=youtu.be[/embed] Read more...
ADManager Plus | December 4, 2015Securing content located in a distributed file system A distributed file system (DFS) is used to “mask” the location of content that is shared...
Identity and access management | September 11, 2014Trusting Microsoft Baseline Security Analyzer 2.3 Not too long ago, Microsoft updated, or at least updated the version of the Microsoft...