Archive for 2015

Even though there are a lot of books and papers that discuss Active Directory security, incidents of AD security breach just don’t seem to stop. What can be the reason for this? Are IT admins just not being able to grasp the tinges of AD security? Or Are they unable to adapt to the new, advanced threats that are being invented every day? Both of these could be the reasons. … Read more

Christmas is the ideal time to relax and switch off but unfortunately there’s no holiday from potential IT security issues at any organization. Furthermore, the absence of administrators or other staff from the IT help desk can only exacerbate the situation. So if you want to avoid Santa bringing you any nasty surprises, you need a dynamic change configuration auditing solution for server components to bulletproof your IT security system … Read more

I was looking over the definition of secure the other day and found the following entry: v. fix or attach (something) firmly so that it cannot be moved or lost And then I applied it to security initiatives within IT. The goal aligns well; you want to fix (read: configure) your network so that the security controls you put in place doesn’t are not “moved or lost” – that is, … Read more

A question regularly asked by the IT community is why do we need a third party solution to audit (Active Directory, Group Policy, Exchange etc.)? To answer this question, we’ve put together a high level paper to talk through the potential pitfalls of auditing without a third party solution. From the outset, this piece unashamedly takes the position that Native Auditing isn’t really adequate for [most]mid-market and enterprise level IT … Read more

  Is your Exchange 2013 migration running slow despite fast network speeds and plenteous amount of resources? Are you experiencing extremely sluggish mailbox movements while transitioning between the two servers? If answers to these questions is a ‘yes’; I’m afraid your mailboxes might be choking or sitting idle doing nothing but wasting your time, money and efforts. This blog discusses how you can intelligently deal with the problem of slow … Read more

What was born on the cloud is now descending to your premises! With the release of Exchange 2016, Microsoft is making a bunch of new features whose radiance we have glimpsed in Exchange Online as a part of Office 365 available for on-premises deployment. These features, having powered millions of mailboxes and public folders in the Cloud environment and having gone through trials and testing in the hands of users … Read more

Think about the last week’s worth of work you’ve accomplished. You put out a bunch of fires; performed some upgrades and new implementations of applications, systems, or servers; and even had a little time for planning some strategic initiatives for next quarter. But as you look over this work and focus specifically in on the manual tasks you performed, would you consider that work particularly efficient? An IT pro’s time … Read more

There is nothing unusual in the growth of an Exchange database with the addition of data. As mailboxes are added, the database increases in size to accommodate them. And it is expected naturally that database size decreases as data is deleted. But one may be amazed to see some abnormalities here—no decrease in database size is observed as mailboxes are deleted from Exchange database. And one more surprise! After deleting … Read more

For users of the controversial adultery dating site Ashley Madison, July 15, 2015,  was a black day indeed. The Canadian organisation reported on that day that an eye-watering 37 million users had had their most personal of personal data leaked. An embarrassment of phenomenal magnitude for any site of its nature but an off-the-charts disaster for an organisation so reliant on secrecy.  A 9.7 GB encrypted file that hackers threatened … Read more

Before I tackle this issue, it’s important to first state that this isn’t going to be another “event viewer sucks” bashing blog. That kind of article is one-sided and unhelpful in the face of an IT Pro like you trying to find real answers. But it is a fair question, and needs to be addressed by looking at native auditing from a few angles. The question isn’t just about the … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.