Introducing Lepide Data Security Platform 25.1: Take Back Control with Lepide Protect Learn more ✕
Lepide Software
  • Download Free Trial
  • Solutions
        • By platform
        • Active Directory
        • Windows File Server
        • Microsoft 365
        • Microsoft 365 Copilot
        • Entra ID
        • Exchange
        • SharePoint
        • SQL Server
        • Nutanix
        • Nasuni
        • Dell EMC
        • See all platforms →
        • By use case
        • Auditing and Reporting
        • Generative AI Security
        • Data Protection
        • Data Access Governance
        • Compliance Management
        • Cloud Data Security
        • See all Use Cases →
        • By industries
        • Educational
        • Finance
        • Healthcare
        • Government
        • Other
  • Platform
        • The Lepide Data Security Platform Award-winning platform to audit and protect files and folders and the systems that govern access to them.
        • Platform overview →
        • Capabilities
        • Lepide Auditor Auditing and reporting
        • Lepide Trust Permissions analysis
        • Lepide Detect Real time alerts and response
        • Lepide Identify Data classification
        • Lepide Protect Permissions management
        • Lepide IQ AI-powered analytics
        • Evaluate Lepide
        • Case studies
        • Datasheets
        • Product documentation
        • Start free trial
        • Launch in-browser demo
        • Request a demo
        • Request a quote
  • Free tools
    • Active Directory Risk Assessment
    • Account Lockout Examiner
    • Find Open Shares
    • Active Directory User Status
    • List AD Admin Users
    • Lepide Change Reporter
  • Insights
    • Webinars
    • Whitepapers
    • eBooks
    • CISO Talks Podcast
    • Blog
    • How-to Guides
    • Cyber Learning
    • News
  • About Us
Recent Post
General | 9 min read

The Ultimate Guide to Active Directory Monitoring Tools

Dan GoaterDan Goater | August 6, 2025
Lepide Data Security Platform Browse by Categories
  • Data Security
  • Active Directory
  • CISO
  • Auditing
  • Compliance
  • Ransomware
  • IT Operations
  • General

More Posts

After-Hours Active Directory Activity
Active Directory

Why After-Hours Active Directory Activity Should Trigger Alarms

Sarah MarshallSarah Marshall August 4, 2025 | 4 min read
Data Security

Why Least Privilege is the key for AI Security

Danny MurphyDanny Murphy July 31, 2025 | 5 min read
AD Permission Sprawl
Active Directory

What is Permission Sprawl in Active Directory?

Dan GoaterDan Goater July 28, 2025 | 8 min read
AD Security Logs
Auditing

How to Continuously Audit and Revoke Unnecessary Admin Access in AD

Philip RobinsonPhilip Robinson July 25, 2025 | 7 min read
Critical Active Directory Misconfigurations
Active Directory

Why Your AD Password Policy Is Probably Weak and Outdated

Danny MurphyDanny Murphy July 23, 2025 | 6 min read
AD Security Logs
General

Understanding Your AD Risk Score: What It Really Tells You

Philip RobinsonPhilip Robinson July 18, 2025 | 5 min read
Load more
Solutions
  • By Industry
  • By Use Case
Platform
  • Overview
  • Lepide Auditor
  • Lepide Detect
  • Lepide Trust
  • Lepide Identify
  • Lepide IQ
  • Lepide Protect
Company
  • Customer portal
  • Support
  • Partners
  • Careers
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Customer Contract & License
  • Linkedin
  • Twitter
  • Facebook
  • YouTube
Sign up for our monthly newsletter
Microsoft partner gold application development DMCA.com Protection Status