Upcoming Webinar       The Complete Guide to Ransomware [Updated for 2022]       26th May, 2PM EDT      Register Now
Archive for the ‘Auditing’ Category

In this blog I will discuss some of the common problems facing IT teams today and how 10 of the most useful reports in Lepide Data Security Platform can help you overcome them. Lepide Data Security Platform is a simple, cost-effective and scalable solution to auditing Active Directory, Group Policy, Exchange Server, SharePoint, SQL Server, and File Server. It also allows you to manage User Password Expiration Reminders, clean-up Active … Read more

Discovering that sensitive data has been compromised or deleted often happens by chance. But the longer an incident goes undetected, the more potential there is for damaging fallout. In a perfect world, the best way to prevent unwanted change, whether by authorized users or hackers, is to follow security best practices, such as managing privileged access, user permissions, restricting the use of domain admin accounts, and implementing a change control … Read more

On a weekly basis we get asked by our prospects if we’re in ‘Gartner’! To which we reply… there isn’t a quadrant for what we do. We’re not a SIEM vendor so we don’t fit here, we’re not an IAM vendor so we don’t fit in here either. And while there are a number of competitors in our space who appear in some peripheral quadrants the fact is there simply … Read more

  Active Directory is the backbone of an enterprise IT infrastructure. Organizations are ready to invest heavily on its security but administrators can ensure the security of Active Directory simply by following some best practices. Here are some tips that can help you: 1. Follow a lean model for AD administration Too many cooks spoil the broth. This is especially true in the case of AD administration so you should … Read more

Christmas is the ideal time to relax and switch off but unfortunately there’s no holiday from potential IT security issues at any organization. Furthermore, the absence of administrators or other staff from the IT help desk can only exacerbate the situation. So if you want to avoid Santa bringing you any nasty surprises, you need a dynamic change configuration auditing solution for server components to bulletproof your IT security system … Read more

A question regularly asked by the IT community is why do we need a third party solution to audit (Active Directory, Group Policy, Exchange etc.)? To answer this question, we’ve put together a high level paper to talk through the potential pitfalls of auditing without a third party solution. From the outset, this piece unashamedly takes the position that Native Auditing isn’t really adequate for [most]mid-market and enterprise level IT … Read more

Before I tackle this issue, it’s important to first state that this isn’t going to be another “event viewer sucks” bashing blog. That kind of article is one-sided and unhelpful in the face of an IT Pro like you trying to find real answers. But it is a fair question, and needs to be addressed by looking at native auditing from a few angles. The question isn’t just about the … Read more

Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes or goes down because of an unwanted change, users will not be able to work. Such problematic changes can be a result of IT administrator’s testing of a new policy in a live environment or because of unwelcome access. , this is very … Read more

IT audits are never fun, but surviving an IT audit is largely just a matter of being able to give the auditors the information that they ask for and being able to prove that you are adhering to established procedure. Of course there are many different types of IT audits and each has its own unique nuances, but there are some general best practices that tend to apply across the … Read more

One of the best ways to know what is happening within your organizational environment is through auditing. Windows Server 2012 Active Directory provides the option to monitor operations performed on the domain and log such information in the Event Viewer. It can log both the successful and failure operations, depending on the audit configuration. As an administrator, you can audit these logs to understand what action was performed by whom … Read more