01.12.2017 , Change Auditing, Auditing, Active Directory, by .

Domain, Schema and Enterprise administrators hold the keys to your Active Directory (AD) kingdom, but it’s not uncommon to find organizations routinely issuing new IT hires with domain administrator privileges to expedite access for support purposes, or at best a proliferation of privileged accounts lying dormant and unaudited, giving attackers a potential way in to your systems. Domain, Schema and Enterprise administrators hold the keys to your Active Directory (AD) … Read more

01.10.2017 , Change Auditing, Security, Auditing, Active Directory, by .

In 2016, a lot of emphasis was put on organizations protecting themselves against external security threats – especially in the light of high profile security breaches, including the FBI and World Anti-Doping Agency. However, most enterprise security executives in 2016 experienced a higher amount of attempted theft or corruption of data from internal sources rather than external ones. With this in mind, don’t repeat the same mistakes in 2017 that … Read more

12.14.2016 , Exchange Server, Migration, by .

Step 1 – Open the Exchange Admin Center To do this, enter the URL of your mailbox server in the URL bar to go to the login page. Step 2 – Login using your username and password Enter the username in the format Domain\user name (For e.g. if your domain is abc.com and username is XYZ, you must write abc\XYZ) and then type your password. Step 3 – Specify users … Read more

11.22.2016 , Exchange Server, by .

There are several scenarios that result in databases failing to mount. IT teams need to be able to overcome these issues quickly to reduce downtime and get the databases functioning properly. In majority of cases, the Exchange Server’s application logs provide enough information to troubleshoot the problem and determine the root cause. In this article, we will discuss 10 of the most common issues that result in databases failing to … Read more

11.17.2016 , Active Directory, by .

Account lockouts are a common problem experienced by Active Directory users. They arise because of Account Lockout Policies configured in the default domain policy for the Active Directory domain. In this article, we will go through some of the root causes of the account lockouts and the way to simplify the troubleshooting process. Common causes of account lockouts Mapped drives using old credentials: Mapped drives can be configured to use … Read more

11.11.2016 , Change Auditing, Security, by .

Keeping the Active Directory secure is a time-consuming task that demands constant vigilance. The increasing strictness of regulatory compliances and the development of new threats from both inside and outside the IT environment have made the task even harder. Regular and pro-active audits will help administrators better understand changes being made to their critical systems – but often organizations fail to see the value and importance of this. In this … Read more

11.04.2016 , Security, by .

With insider security threats on the rise, and the increasing strictness and regularity of compliance mandates, auditing critical IT systems on a regular basis is an important part of the IT team’s job. Effective auditing will help you to fix IT problems faster and give you a better understanding of what’s happening in your IT environment. We recently ran a survey, aimed mostly at System Administrators in the USA, to … Read more

10.26.2016 , Change Auditing, Exchange Server, by .

Mailboxes are a very important part of every organization since they can contain high business impact (HBI) information and personally identifiable information (PII). This makes it essential to keep track of every activity taking place in the Exchange environment. When it comes to mailbox access, tracking the access of non-owners is a very important part of ensuring that mailboxes are being used correctly. Mailbox audit logging is a feature of … Read more

10.12.2016 , Active Directory restore, Active Directory, by .

The Active Directory is arguably the most important part of any organization’s IT infrastructure. It’s important to be vigilant when it comes to monitoring and alerting on any changes made to this system so that you can spot any changes that may have been made in error or are damaging. Occasionally, objects can be deleted by mistake or administrators may delete objects that have been created for test purposes. Whatever … Read more

10.07.2016 , Exchange Server, Migration, by .

This is the final part of our series of blogs going into detail about the process of migrating from Exchange Server 2013 to 2016. In the previous post, we showed you how to move user mailboxes and public folders to the new Exchange Server. To read other parts in this series, go to: Exchange 2013 to Exchange 2016 Migration (Part 1) Exchange 2013 to Exchange 2016 Migration (Part 2) Exchange … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.