• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:monitor

Detecting changes in privileged accounts in Azure AD

Identity and access management | May 23, 2019

Detecting changes in privileged accounts in Azure AD

Monitoring and protecting privileged accounts is paramount because failure to do so can...

Monitoring users for unusual file activity

Identity and access management | December 19, 2018

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...

Identity and access management | December 6, 2018

Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar]

Active Directory is still vital for every organization that's staying on-premises or...

Identity and access management | November 29, 2018

Monitoring Active Directory and Windows computers to detect attacks [Webinar]

If organizations and administrators can be alerted when they're under attack, then they...

Identity and access management | October 5, 2018

Auditing and securing Active Directory webinar series

With the number of data breaches increasing by the day, enterprises need to closely...

Identity and access management | July 19, 2018

Securing and protecting Active Directory and Windows networks webinar series

Recent attacks have proven that additional work needs to be done to secure our Windows...

Identity and access management | June 14, 2018

Free webinar: Tracking Active Directory attacks and user logons

Microsoft Active Directory is the center of most enterprises' network identity management....

Use change monitoring to never let a change go unnoticed in Active Directory

Identity and access management | April 19, 2018

Use change monitoring to never let a change go unnoticed in Active Directory

Active Directory relies on services distributed across many, interdependent devices in...

Webinar: Negating insider threats

Identity and access management | April 6, 2018

Webinar: Negating insider threats

Organizations need to be keenly aware of the actions their employees take, especially...

Identity and access management | March 8, 2018

Tracking Group Policy changes: Why you should look beyond native auditing

Group Policy is undoubtedly one of the most powerful features of Active Directory. It...

Identity and access management | December 28, 2017

Preparing for the GDPR: Designing Active Directory groups

One aspect of the GDPR is the fact that all users who have access to personal data must be...

Common mistakes administrators make when applying GPOs – Part 3

Identity and access management | November 16, 2017

Common mistakes administrators make when applying GPOs – Part 3

Although it's not directly related to the application of Group Policy Objects (GPOs),...

Page 1 of 212»Last »