DataSecurity Plus | October 11, 2023Access granted: Mastering the art of permissions Back in the 20th century, cyberattacks were harder to execute because most computers were...
Identity and access management | February 14, 2019File server auditing: Excluding certain files and file types In order to improve the efficiency of audit reports, administrators auditing a file server...
ADManager Plus | February 18, 2016Reporting on folder access permissions [embed]https://www.youtube.com/watch?v=LzVmv_NE364&feature=youtu.be[/embed] Read more...
ADManager Plus | February 11, 2016Managing folder permissions from a central location [embed]https://www.youtube.com/watch?v=lUwFAed_bkc&feature=youtu.be[/embed] Try out...
Identity and access management | September 14, 2015Monitor Files and Folders Like Never Before Over and over, I get the same question from many admins and security professionals...
ADManager Plus | June 19, 2015Protecting Active Directory From the JASBUG Vulnerability We live in a very dynamic and unfriendly environment with computers and the JASBUG...
ADManager Plus | March 26, 2015Establishing an Active Directory security baseline is essential After my initial Global Active Directory Seminar world tour, I came back with one key...
ADManager Plus | October 23, 2014Active Directory Delegation: It Does Not Need to Be Hard! One of the most important and powerful reasons that organizations consider Active...
ADManager Plus | July 18, 2014Unveiling your Active Directory delegations Ever since Microsoft released Active Directory in 2000, there has been an option referred...