Archive for the ‘General’ Category

It’s that time of year when you might be expecting many of your employees (some of which will be privileged users) to take some well-earned holidays. In their absence, much of the work is delegated to other members within the organization or even to contractors in some cases. In the case of your privileged users, for this to happen, often temporary access needs to be provided. Managing this privileged access, … Read more

Active Directory has long been a go-to platform for many organizations for centralized user account information. Because of its wide adoption, it has become a high value target for attackers – often attempting to steal credentials and elevate their privileges for access to the most sensitive data. As per a recent Forrester report on the State of Microsoft Active Directory 2018, there are a few key areas in which Active … Read more

Advanced Persistent Threats (APTs) rely on our inability to detect, alert and respond to any indicators that may suggest that our system has been compromised. Such indicators include; unusual account activity, traffic patterns, registry changes, and anomalous file and folder activity. Below are the top 10 different ways to tell if your system has been compromised. 1. Suspicious Privileged Account Activity Should an attacker gain access to a user account … Read more

Apart from the obvious difference in on-premise vs cloud location, there are many more nuanced differences between Windows Active Directory and Azure AD. Due to the changing nature of how organizations interact with data, Microsoft were pretty much forced to create a cloud-based directory, using completely different code bases and with completely different purposes. This means that you cannot simply assume that Azure AD is the same as Windows Active … Read more

Having a strong password policy is your first line of defence. Many users are aware of the security risks associated with having an easy-to-guess passwords, yet often they choose one anyway. We understand that it can be frustrating to be asked to memorize complex passwords, only to be asked to change them every 90 days. It is therefore necessary for sysadmins to reason with staff members and make sure that … Read more

Through Active Directory, administrators can assign and enforce the security policies of the entire domain and manage them from a central location. A big part of dealing with both external and internal attacks is tracking logon activity. Most organizations need to work on increasing log on control measures and proactively tracking the logon activities of all users. However, Active Directory logon and logoff controls have some major limitations which make … Read more

July 28th 2017 – SysAdmin Day. A day to celebrate the work, that often takes place behind closed doors, of System Administrators worldwide. We’re taking today to think about being a Sys Admin, in particular the pros and cons of the coveted role. First things first, what is a Systems Administrator? Officially they are responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as … Read more

The DMTF WS-Eventing standard was first introduced in Windows Server 2008 so that system administrators could centralize Windows event logs. As part of the open Web Services-Management (WS-Man) protocol that’s included in the Windows Management Framework (WMF), event forwarding provides a means to read and store event logs from Windows devices in one place. Windows Event Forwarding (WEF) is agentless, so you don’t need to install any additional software to … Read more

Your old Exchange Server should be decommissioned when you are upgrading or switching to another Exchange Server. A proper plan is required before going ahead. All the content of User Mailboxes and Public Folders have to be migrated to the Target Exchange Server. Keeping in view the different issues that may arise while decommissioning the Exchange Server, we at Lepide Software have created three documents to illustrate the step-by-step process … Read more

Microsoft recently launched the new beta version of the Exchange 2016 messaging platform – packed with exclusive features and enhancements to help improve the platform. Here we will take you through what’s new about Exchange 2016 and compare it to the commonly used Exchange 2013. 1. Redesigned Exchange 2016 vs Exchange 2013 Architecture The Exchange 2016 architecture has been redesigned in order to ensure efficient hardware utilization, failure isolation and … Read more