Archive for the ‘Auditing’ Category

This tutorial explains the steps of performing Current Permission Analysis of the shared files and folders using LepideAuditor Suite for File Server . It offers customizable auditing, dedicated Radar Tab with graphical representation of Audit Data, predefined audit report, Historical Permission Analysis, and Current Permission Reports. When it comes to current permissions, it provides a detailed report of all the permission related data including change in applied permissions by folder, … Read more

Anyone in charge of regularly auditing their organization’s Active Directory knows how difficult it can be to log, filter and recover event details from mountains of raw log data. If you’re reading this, then it is likely that you have decided to go for an automated solution to make things easier. There are many solutions on the market that claim to do similar things so it is important that you … Read more

Is auditing important? With the rising number of security threats, and increasing regularity and strictness of compliance mandates, auditing your IT environment is more important than it has ever been. Effective auditing will help you to fix IT problems faster and give you a better understanding of what’s happening in your IT environment. Modern organizations must have a mature approach to auditing to ensure adequate systems management, security and compliance. … Read more

All organizations should be able to immediately see what’s happening to their files/folders and when it is happening. With security breaches becoming more common, and compliance mandates becoming more prevalent, the requirement to ensure you have adequate auditing on your file/folders is more important than ever before. In this article we will show you how to audit your file/folder level access using native tools in three steps: A). Enabling the … Read more

Massive data breaches often work the same way. The hacker gains access by exploiting a software security weakness or installing malware through phishing links. Then the hacker grants themselves elevated access so they can login to a database directly. Often this is done with stolen credentials, using user ids that are shipped with software, or brute password dictionary attacks against systems that do not lock accounts when this happens. This … Read more

Despite the presence of sophisticated security solutions, often organisations struggle to answer the most basic security questions – who, what, where and when (the 4 W’s). This is particularly pertinent when it comes to the most critical IT systems such as Active Directory, SQL Server, Exchange Server, and SharePoint. Trying to answer these 4 questions using native audit logs alone can be challenging. The importance of the 4 W’s If … Read more

In this blog I will discuss some of the common problems facing IT teams today and how 10 of the most useful reports in LepideAuditor Suite can help you overcome them. LepideAuditor Suite is a simple, cost-effective and scalable solution to auditing Active Directory, Group Policy, Exchange Server, SharePoint, SQL Server, and File Server. It also allows you to manage User Password Expiration Reminders, clean-up Active Directory and perform Permission … Read more

Discovering that sensitive data has been compromised or deleted often happens by chance. But the longer an incident goes undetected, the more potential there is for damaging fallout. In a perfect world, the best way to prevent unwanted change, whether by authorized users or hackers, is to follow security best practices, such as managing privileged access, user permissions, restricting the use of domain admin accounts, and implementing a change control … Read more

On a weekly basis we get asked by our prospects if we’re in ‘Gartner’! To which we reply… there isn’t a quadrant for what we do. We’re not a SIEM vendor so we don’t fit here, we’re not an IAM vendor so we don’t fit in here either. And while there are a number of competitors in our space who appear in some peripheral quadrants the fact is there simply … Read more

  Active Directory is the backbone of an enterprise IT infrastructure. Organizations are ready to invest heavily on its security but administrators can ensure the security of Active Directory simply by following some best practices. Here are some tips that can help you: 1. Follow a lean model for AD administration Too many cooks spoil the broth. This is especially true in the case of AD administration so you should … Read more