• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Melber

Detecting changes in privileged accounts in Azure AD

Identity and access management | May 23, 2019

Detecting changes in privileged accounts in Azure AD

Monitoring and protecting privileged accounts is paramount because failure to do so can...

Two-factor authentication for secure access to cloud apps in hybrid AD

ADSelfService Plus | May 17, 2019

Two-factor authentication for secure access to cloud apps in hybrid AD

In an earlier post, we dealt with the benefits of single sign-on (SSO) for cloud apps in...

Gain insights into user behavior and detect insider threats

Identity and access management | March 6, 2019

Gain insights into user behavior and detect insider threats

A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...

File server auditing: Excluding certain files and file types

Identity and access management | February 14, 2019

File server auditing: Excluding certain files and file types

In order to improve the efficiency of audit reports, administrators auditing a file server...

Identity and access management | January 17, 2019

Securing Hybrid Active Directory webinar series

Active Directory (AD) administrators are heading into 2019 with security on their minds....

Minimizing membership in the local Administrators group on workstations

Identity and access management | December 20, 2018

Minimizing membership in the local Administrators group on workstations

If you have a long list of users with administrative rights, there's a good chance you've...

Identity and access management | December 6, 2018

Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar]

Active Directory is still vital for every organization that's staying on-premises or...

Identity and access management | November 29, 2018

Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they're under attack, then they...

Identity and access management | November 15, 2018

User behavior analytics for streamlined threat detection

Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

Identity and access management | November 1, 2018

Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2

In Part 1, we touched on how routine monitoring of object life cycle changes in the local...

Application whitelisting using Software Restriction Policies

General | October 25, 2018

Application whitelisting using Software Restriction Policies

Software Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory ...

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Identity and access management | October 11, 2018

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you're an admin in a company that prides itself on its security practices, which...

Page 1 of 13123...»Last »