Archive for the ‘Auditing’ Category

Despite the presence of sophisticated IT solutions, organizations often struggle to lay the foundation for a secure IT environment. Critical Servers, including File Server, Active Directory and Office 365, are a major target for attacks and data breaches in general. Regular auditing is therefore necessary to ensure the protection of critical business data, increase security and improve service availability with minimum downtime. To the relief of many IT administrators, Microsoft … Read more

A recent study found that Office 365 is present in about 91.4% of enterprises. Despite this, getting visibility on changes made to Office 365 can be a time-consuming and frustrating task for IT admins, especially if you’re having to do it manually. This cloud-based server often stores sensitive information such as financial records, business plans, payment card numbers, Social security numbers and more. Therefore, it’s essential that you have a … Read more

Whether you’re an intern, an employee, a partner, or the CEO; most employees use email as their primary form of communication both internally and externally. Due to the amount of critical and sensitive information shared via this medium, it’s important to have some sort of visibility over who’s accessing mailboxes. Most cyber-criminals target valuable data stockpiled in multiple computers and servers in your IT infrastructure. Exchange Server deployments in your … Read more

I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands. As an IT manager; you need to be doing everything you can to ensure the integrity of your data. If you’re wondering how best to do this, I’d suggest you start right here. Listed below are some of our … Read more

Ninety-five percent of the Fortune 1000 companies, and millions of businesses in the SME segment, use Active Directory as the base of their network infrastructure. Ensuring Active Directory security whilst staying compliant to ever evolving regulatory guidelines is starting to become a challenge for many organizations. Thankfully, it doesn’t have to be. In this article, I hope to show you why you need LepideAuditor – a scalable and affordable IT … Read more

Keeping Active Directory clean and secure is a never-ending challenge for IT teams. But worrying about what your users are changing in your critical servers or data shouldn’t be keeping you up at night. Insight-driven actions, taken at the right time, can help to identify and prevent potential attacks/leaks before the damage is done. Arming your infrastructure with a third-party auditing solution is an investment into the future security and … Read more

Are you able to instantly identify who has access to the sensitive data in your Active Directory? Sometimes, answering “who has access to what?” in your IT environment can be difficult. Knowing who has permission to what enables IT teams to ensure that the right users have the right levels of access to the right data. This is a critical part of ensuring the principle of least privileges, where users … Read more

Separation of duties (SoD) – also referred to as “Segregation of duties” – is a critical, yet often overlooked area of IT security. Essentially, the purpose of SoD is to help organisations protect themselves from fraudulent behaviour by ensuring that no single individual can act alone to subvert a critical process for their own personal gain. SoD is an area that comes under close scrutiny during compliance reviews, and will … Read more

Auditing file and folder accesses on Windows File Servers enables you to see whether any users are accessing or trying to access resources without authrization. A large proportion of organisations are not making the most of file server auditing, choosing to stick to native auditing processes which can be both time-consuming and complex. At Lepide, we recommend deploying a third-party solution (obviously…), such as LepideAuditor. With an increasingly mobile workforce … Read more

People generally think that auditing and monitoring are the same thing and, in some ways, they are. The differences between them are subtle, but important none-the-less. In short, auditing is done by auditors, and it is the auditors responsibility to make use of the available technology to aggregate and present the log data in a way that that can be understood and “monitored” by administrators and managers. While most modern … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.