Archive for the ‘Auditing’ Category

Christmas is the ideal time to relax and switch off but unfortunately there’s no holiday from potential IT security issues at any organization. Furthermore, the absence of administrators or other staff from the IT help desk can only exacerbate the situation. So if you want to avoid Santa bringing you any nasty surprises, you need a dynamic change configuration auditing solution for server components to bulletproof your IT security system … Read more

A question regularly asked by the IT community is why do we need a third party solution to audit (Active Directory, Group Policy, Exchange etc.)? To answer this question, we’ve put together a high level paper to talk through the potential pitfalls of auditing without a third party solution. From the outset, this piece unashamedly takes the position that Native Auditing isn’t really adequate for [most]mid-market and enterprise level IT … Read more

Before I tackle this issue, it’s important to first state that this isn’t going to be another “event viewer sucks” bashing blog. That kind of article is one-sided and unhelpful in the face of an IT Pro like you trying to find real answers. But it is a fair question, and needs to be addressed by looking at native auditing from a few angles. The question isn’t just about the … Read more

Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes or goes down because of an unwanted change, users will not be able to work. Such problematic changes can be a result of IT administrator’s testing of a new policy in a live environment or because of unwelcome access. , this is very … Read more

IT audits are never fun, but surviving an IT audit is largely just a matter of being able to give the auditors the information that they ask for and being able to prove that you are adhering to established procedure. Of course there are many different types of IT audits and each has its own unique nuances, but there are some general best practices that tend to apply across the … Read more

One of the best ways to know what is happening within your organizational environment is through auditing. Windows Server 2012 Active Directory provides the option to monitor operations performed on the domain and log such information in the Event Viewer. It can log both the successful and failure operations, depending on the audit configuration. As an administrator, you can audit these logs to understand what action was performed by whom … Read more

LepideAuditor for File Server (LAFS) is a one-stop solution to audit the file servers in an organization. It audits the events of all files and folders on the server, including shared folder such as access, create, delete, modify, and copy. Easy-to-use interface lets a user add the File Server, create an audit policy, create a rule, and the auditing will be started instantly. It will show every change in the … Read more

The purpose of this post is to define the process to audit the successful or failed logon and logoff attempts in the network using the audit policies. “Audit Logon Events” and “Audit Account Logon Events”, meant for monitoring the logon/logoff events, are disabled by default. It is required to enable these policies manually. Before going to learn how to enable these policies, it is important to know in brief about … Read more

Android is the most widely used Operating Systems for smart devices like smartphones and tablets. Its popularity and usage to browse the World Wide Web had already surpassed that of Windows devices and computers. Seeking their popularity the IT professionals are already using the third party apps for connecting with their File Servers, taking remotes of their machines, and managing their servers. These apps are serving their purpose for which … Read more

Article Author: Peter Gubarevich (MVP – Enterprise Security), Certified Ethical Hacker Everything was just fine until yesterday. Usually, I’m managing local group membership using Active Directory Group Policies, either Restricted Groups node, or GP Preferences node. It’s quite questionable which node to choose, but anyway, Group Policy makes it easy to perform updates and enforce membership throughout a domain, and exactly fits my requirements. However, there’s another side of the … Read more


Notice: ob_end_flush(): failed to send buffer of zlib output compression (0) in /home/lepidec/public_html/blog/wp-includes/functions.php on line 3818