02.16.2017 , Security, by .

There are three basic principles to consider when deciding how to provide access to sensitive data in a secure manner, namely: Confidentiality, Integrity, and Availability. These principals are collectively known as the CIA triad. Confidentiality The level of confidentiality will naturally determine the level of availability for certain data. Confidentiality is a question of how, and where, the data can be accessed. To ensure confidentiality, one must safeguard the data … Read more

02.08.2017 , Security, by .

As of May 2018, the General Data Protection Regulation (GPDR) will come into effect, which sets out to harmonise and strengthen data protection for individuals within the European Union. Under this new directive, appointing a DPO (Data Protection Officer) is a mandatory requirement for companies and organisations who either employ more than 250 people or require the storing and processing of public data. It’s is important to note that, the … Read more

02.03.2017 , Compliance, by .

For those who don’t know about GDPR, it stands for the General Data Protection Regulation, and is a new set of rules passed by the European Union which aim to reform the out-dated and inconsistent EU Data Protection Directive. The GPDR will come into effect from May 2018 and will be applicable across all 28 EU member states. However, for those of you that believe Brexit means you won’t be … Read more

01.20.2017 , Change Auditing, Security, Auditing, Active Directory, by .

In view of the rapidly increasing security risks IT enterprises are facing, securing the Active Directory from privilege misuse and abuse has become a global concern. Domain administrator rights are often granted to Active Directory users with to allow them to accomplish various tasks inside or outside of the network. However, giving large numbers of users privileged access can be problematic – occasionally leading to privilege abuse in the form … Read more

01.12.2017 , Change Auditing, Auditing, Active Directory, by .

Domain, Schema and Enterprise administrators hold the keys to your Active Directory (AD) kingdom, but it’s not uncommon to find organizations routinely issuing new IT hires with domain administrator privileges to expedite access for support purposes, or at best a proliferation of privileged accounts lying dormant and unaudited, giving attackers a potential way in to your systems. If it’s a revelation that domain administrator privileges aren’t required to add, delete, … Read more

01.10.2017 , Change Auditing, Security, Auditing, Active Directory, by .

In 2016, a lot of emphasis was put on organizations protecting themselves against external security threats – especially in the light of high profile security breaches, including the FBI and World Anti-Doping Agency. However, most enterprise security executives in 2016 experienced a higher amount of attempted theft or corruption of data from internal sources rather than external ones. With this in mind, don’t repeat the same mistakes in 2017 that … Read more

12.14.2016 , Exchange Server, Migration, by .

Step 1 – Open the Exchange Admin Center To do this, enter the URL of your mailbox server in the URL bar to go to the login page. Step 2 – Login using your username and password Enter the username in the format Domain\user name (For e.g. if your domain is abc.com and username is XYZ, you must write abc\XYZ) and then type your password. Step 3 – Specify users … Read more

11.22.2016 , Exchange Server, by .

There are several scenarios that result in databases failing to mount. IT teams need to be able to overcome these issues quickly to reduce downtime and get the databases functioning properly. In majority of cases, the Exchange Server’s application logs provide enough information to troubleshoot the problem and determine the root cause. In this article, we will discuss 10 of the most common issues that result in databases failing to … Read more

11.17.2016 , Active Directory, by .

Account lockouts are a common problem experienced by Active Directory users. They arise because of Account Lockout Policies configured in the default domain policy for the Active Directory domain. In this article, we will go through some of the root causes of the account lockouts and the way to simplify the troubleshooting process. Common causes of account lockouts Mapped drives using old credentials: Mapped drives can be configured to use … Read more

11.11.2016 , Change Auditing, Security, by .

Keeping the Active Directory secure is a time-consuming task that demands constant vigilance. The increasing strictness of regulatory compliances and the development of new threats from both inside and outside the IT environment have made the task even harder. Regular and pro-active audits will help administrators better understand changes being made to their critical systems – but often organizations fail to see the value and importance of this. In this … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.