08.25.2015, Comments Off, Migration, Office 365, SharePoint, by .

Carrying out migration operations from on-premise SharePoint to Office 365 has never been a piece of cake, especially when you want to do it in a cost-effective manner!! Very often, I’ve seen IT administrators going through big checklists of what to do and what not to do before actually proceeding to migrate users to the Cloud. Undoubtedly, there are myriad of factors to consider when you also want to avoid burning a hole in your pocket while transitioning from a SharePoint solution that Read more...

08.21.2015, Comments Off, Security, by .

For users of the controversial adultery dating site Ashley Madison, July 15, 2015,  was a black day indeed. The Canadian organisation reported on that day that an eye-watering 37 million users had had their most personal of personal data leaked. An embarrassment of phenomenal magnitude for any site of its nature but an off-the-charts disaster for an organisation so reliant on secrecy.  A 9.7 GB encrypted file that hackers threatened to leak online claimed to contain the login details, Read more...

08.14.2015, Comments Off, Change Auditing, by .

Before I tackle this issue, it’s important to first state that this isn’t going to be another “event viewer sucks” bashing blog. That kind of article is one-sided and unhelpful in the face of an IT Pro like you trying to find real answers. But it is a fair question, and needs to be addressed by looking at native auditing from a few angles. The question isn’t just about the tool used, or the viability of the audit data, or how quickly you can find an answer. It’s really about Read more...

07.31.2015, Comments Off, Change Auditing, event, Security, by .

Organization’s computer systems hold sensitive information which can be conceded in various ways, like; malicious or unintentional actions, or through the failure of software or electronic components. Malicious attacks or cyber-attacks causes an immense amount of damage to organization’s integrity and security. Hacking of organization’s data through cyber-attacks are increasingly communal today. Cyber-attacks and their subsequent safety breaches are a part of swiftly growing Read more...

07.24.2015, Comments Off, Change Auditing, Security, by .

Compromising Domain Controllers (DC) is equivalent to endangering the entire Active Directory. The logic behind this is simple—when an attacker gets access to the Domain Controller, he will be able to access and change everything related to the AD domain. A hacker who has got access to Domain Controllers may: cause damage to AD DS database access the security database and the information therein leak the security configuration information change security configurations to access domain Read more...

07.23.2015, Comments Off, Miscellaneous, by .

They hound you day after day, they try every trick in the book to get you on the phone and if one of these poor souls are lucky enough to get through they talk AT you like you care what they say. IT sales people more often than not are not a welcome interruption for the IT Manager. On average an IT Manager will get 12-14 calls a day from some vendor or reseller wanting to pitch their wares. Often the sales rep is making 100+ calls a day into unsuspecting IT Managers and yet the reality is Read more...

06.26.2015, Comments Off, AD Self Service, by .

  Passwords are used in many ways to protect your data, systems, and networks. Password management is significant as it safeguards your sensitive business and personal information against hacking, illicit access, and filched data.Using same password everywhere is not an acclaimed solution as it may cause trouble to your security. If a hacker has one of your password then there is a probability that he may have all your passwords. Therefore, it’s better to use different passwords Read more...

06.19.2015, Comments Off, General, Security, by .

Are you a Windows administrator in charge of the IT network of the organization? There are chances that you make mistakes on many fronts. But don’t worry. You are not alone. We here will tell you the most common mistakes that IT administrators fall prey to. 1. Not planning IT infrastructure and resources As an administrator you can ignore planning only at your own peril. You are in charge of everything— IT infrastructure, Group Policy management, user management, permission management, Read more...

06.03.2015, Comments Off, File Server Auditor, by .

Security Auditing of an enterprise – whether in an extremely large organization or a smaller one is one of the most important concern pertaining to protect your confidential or private data from hackers eyes. Unauthorized file access, falsification and even deletion and modification of files & folders has become a common phenomenon in organizations where it becomes difficult to audit events, track malicious user actions & monitor illegal access.

05.25.2015, Comments Off, Migration, by .

Every Exchange administrator will frankly admit that Exchange to Exchange/Office is a tedious task even for a seasoned administrator. Owing to the complexities involved, organizations go for Exchange migration only after detailed study and planning. LepideMigrator for Exchange (LME) is a professional tool that automates the data migration between two Exchange Servers that are located in same or different domains. It migrates data to Office 365 cloud too. Some important features and facilities Read more...