07.20.2016 , Change Auditing, Auditing, Active Directory, by .

Anyone in charge of regularly auditing their organization’s Active Directory knows how difficult it can be to log, filter and recover event details from mountains of raw log data. If you’re reading this, then it is likely that you have decided to go for an automated solution to make things easier. There are many solutions on the market that claim to do similar things so it is important that you … Read more

07.15.2016 , SharePoint, by .

SharePoint 2016 is finally out in beta and showcases some new features and enhancements. Its main focus is to make integration with cloud-based Office 365 services much easier. This release will be most useful to those users who have not yet moved to the cloud and give them the chance to make use of cloud technology. Here are 12 significant updates provided in SharePoint 2016: 1. App launcher and UI … Read more

07.11.2016 , Security, by .

Whilst many organizations give high priority to protecting themselves against outside security threats like hackers, a high proportion aren’t even aware that they may be at risk from the inside. When employees, ex-employees, business partners or associates leak, sell, or manipulate sensitive information either by accident or maliciously the organization may suffer. Financial losses and reputation may get affected irreparably, especially if the information contains intellectual property, business secrets, and … Read more

06.22.2016 , General, Security, by .

A few weeks ago, InfoSecurity – Europe’s largest Information Security industry event – took place in London and we at Lepide exhibited our auditing and monitoring solution for the first time. Now that we have had time to collect our thoughts we thought it would be a good idea to share what we learnt from talking to some of the industry’s experts. What we learnt is that, despite evidence of … Read more

06.03.2016 , Exchange Server, Migration, by .

With any type of migration there are numerous factors that must be considered before you start. You need to know how the migration will affect the resources of your IT department, whether there will be any downtime and what the most appropriate migration method is. Many organisations decide to deploy third-party solutions to help automate and speed up the migration process – but are they necessary? The most common aspects … Read more

05.20.2016 , Auditing, by .

Is auditing important? With the rising number of security threats, and increasing regularity and strictness of compliance mandates, auditing your IT environment is more important than it has ever been. Effective auditing will help you to fix IT problems faster and give you a better understanding of what’s happening in your IT environment. Modern organizations must have a mature approach to auditing to ensure adequate systems management, security and compliance. … Read more

05.13.2016 , File Server Auditor, by .

All organizations should be able to immediately see what’s happening to their files/folders and when it is happening. With security breaches becoming more common, and compliance mandates becoming more prevalent, the requirement to ensure you have adequate auditing on your file/folders is more important than ever before. In this article we will show you how to audit your file/folder level access using native tools in three steps: A). Enabling the … Read more

05.12.2016 , Migration, by .

One of the biggest obstacles you may face when attempting an Exchange migration from an older version to a newer one is how to move the Public Folders without double hopping. Well, there is no way to avoid this natively; but while performing cross-domain migrations, we can get rid of the double hop trouble. This article will show you how you can use, LepideMigrator for Exchange to migrate Public Folders … Read more

05.05.2016 , Exchange Recovery, by .

Occasionally you may find yourself, for whatever reason, in a position where you have to manually recover a mailbox using Outlook. Luckily, OST files makes this possible – they provide offline folders that are essentially replicas of the master server based folders from which you can synchronize with the Exchange server itself. In this guide we will show you how to easily recover a mailbox using OST file in two … Read more

05.03.2016 , Auditing, by .

Massive data breaches often work the same way. The hacker gains access by exploiting a software security weakness or installing malware through phishing links. Then the hacker grants themselves elevated access so they can login to a database directly. Often this is done with stolen credentials, using user ids that are shipped with software, or brute password dictionary attacks against systems that do not lock accounts when this happens. This … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2016 Lepide Software Private Limited. All Trademarks Acknowledged.