Upcoming Webinar 26th June 2025: The State of Active Directory Security in 2025 Register Now ✕
Lepide Software
  • Download Free Trial
  • Solutions
        • By platform
        • Active Directory
        • Windows File Server
        • Microsoft 365
        • Microsoft 365 Copilot
        • Entra ID
        • Exchange
        • SharePoint
        • SQL Server
        • Nutanix
        • Nasuni
        • Dell EMC
        • See all platforms →
        • By use case
        • Auditing and Reporting
        • Generative AI Security
        • Data Protection
        • Data Access Governance
        • Compliance Management
        • See all Use Cases →
        • By industries
        • Educational
        • Finance
        • Healthcare
        • Government
        • Other
  • Platform
        • The Lepide Data Security Platform Award-winning platform to audit and protect files and folders and the systems that govern access to them.
        • Platform overview →
        • Capabilities
        • Lepide Auditor Auditing and reporting
        • Lepide Trust Permissions analysis
        • Lepide Detect Real time alerts and response
        • Lepide Identify Data classification
        • Lepide Protect Permissions management
        • Lepide IQ AI-powered analytics
        • Evaluate Lepide
        • Case studies
        • Datasheets
        • Product documentation
        • Start free trial
        • Launch in-browser demo
        • Request a demo
        • Request a quote
  • Free tools
    • Account Lockout Examiner
    • Find Open Shares
    • Active Directory User Status
    • List AD Admin Users
    • Lepide Change Reporter
  • Insights
    • Webinars
    • Whitepapers
    • eBooks
    • CISO Talks Podcast
    • Blog
    • How-to Guides
    • Cyber Learning
    • News
  • About Us
Recent Post
Data Security | 8 min read

Critical Active Directory Misconfigurations That Could Expose Your Network

Philip RobinsonPhilip Robinson | May 30, 2025
Lepide Data Security Platform Browse by Categories
  • Data Security
  • CISO
  • Auditing
  • Compliance
  • Ransomware
  • IT Operations
  • General

More Posts

ms-cyber-Attack
Data Security

M&S Cyber Attack: How Hackers Shut Down Retail Giant

Iain RobertsIain Roberts May 29, 2025 | 12 min read
Growing Threat of Ransomware
Ransomware

Ransomware Hidden in JPG Images: The Alarming Cyber Threat of 2025

Dan GoaterDan Goater May 26, 2025 | 7 min read
User Provisioning in Active Directory
General

What is User Provisioning in Active Directory?

Danny MurphyDanny Murphy May 21, 2025 | 13 min read
Active Directory is a Prime Target
Data Security

Why Active Directory is Prime Target for Attackers

Terry MannTerry Mann May 19, 2025 | 8 min read
CMMC Compliance
Compliance

What is Compliance Reporting? Types and Examples

Sarah MarshallSarah Marshall May 13, 2025 | 10 min read
General

Lepide Free Tools to Monitor and Manage Active Directory

Aidan SimisterAidan Simister May 9, 2025 | 6 min read
Load more
Solutions
  • By Industry
  • By Use Case
Platform
  • Overview
  • Lepide Auditor
  • Lepide Detect
  • Lepide Trust
  • Lepide Identify
  • Lepide IQ
  • Lepide Protect
Company
  • Customer portal
  • Support
  • Partners
  • Careers
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Customer Contract & License
  • Linkedin
  • Twitter
  • Facebook
  • YouTube
Sign up for our monthly newsletter
Microsoft partner gold application development DMCA.com Protection Status