• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:group

Detecting changes in privileged accounts in Azure AD

Identity and access management | May 23, 2019

Detecting changes in privileged accounts in Azure AD

Monitoring and protecting privileged accounts is paramount because failure to do so can...

Minimizing membership in the local Administrators group on workstations

Identity and access management | December 20, 2018

Minimizing membership in the local Administrators group on workstations

If you have a long list of users with administrative rights, there's a good chance you've...

Monitoring users for unusual file activity

Identity and access management | December 19, 2018

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...

Identity and access management | November 29, 2018

Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they're under attack, then they...

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

Identity and access management | November 1, 2018

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local...

Application whitelisting using Software Restriction Policies

General | October 25, 2018

Application whitelisting using Software Restriction Policies

Software Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory ...

Instantly restore AD objects to any previous version

Identity and access management | September 13, 2018

Instantly restore AD objects to any previous version

There are multiple reasons for restoring an Active Directory (AD) object to a previous...

Use change monitoring to never let a change go unnoticed in Active Directory

Identity and access management | April 19, 2018

Use change monitoring to never let a change go unnoticed in Active Directory

Active Directory relies on services distributed across many, interdependent devices in...

Webinar: Negating insider threats

Identity and access management | April 6, 2018

Webinar: Negating insider threats

Organizations need to be keenly aware of the actions their employees take, especially...

How to find objects in Active Directory

Identity and access management | April 5, 2018

How to find objects in Active Directory

Active Directory (AD) administrators have always had to come up with unique ways of...

Identity and access management | January 4, 2018

A New Year's resolution for Windows administrators

Did you make your personal New Year's resolution? How about your professional one? With...

Identity and access management | December 30, 2017

2017 IT recap—Things we learned

2017 was full of new information, new technologies, and lessons learned. As I toured the...

Page 1 of 5123...»Last »