Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
Identity and access management | February 14, 2019File server auditing: Excluding certain files and file types In order to improve the efficiency of audit reports, administrators auditing a file server...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1 Imagine you're an admin in a company that prides itself on its security practices, which...
Identity and access management | October 5, 2018Auditing and securing Active Directory webinar series With the number of data breaches increasing by the day, enterprises need to closely...
Identity and access management | June 7, 2018Selecting an IAM solution that fits your enterprise When it comes to managing the identity and access of users, Active Directory leaves a few...
Identity and access management | April 19, 2018Use change monitoring to never let a change go unnoticed in Active Directory Active Directory relies on services distributed across many, interdependent devices in...
Identity and access management | April 5, 2018How to find objects in Active Directory Active Directory (AD) administrators have always had to come up with unique ways of...
General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
Identity and access management | March 8, 2018Tracking Group Policy changes: Why you should look beyond native auditing Group Policy is undoubtedly one of the most powerful features of Active Directory. It...
Identity and access management | December 14, 2017GDPR preparation—Testing GDPR compliance auditing will be new to many organizations that have never been under a...
Identity and access management | October 19, 2017Deleting unlinked Group Policy Objects There are many moving parts with regard to Group Policy, which can make it difficult to...
Identity and access management | September 21, 2017Active Directory from A to Z! Now that summer is over, we are delivering a variety of webinars all geared to increase...