HTML Site Map

Homepage Last updated: 2018, July 12
Total pages: 1562

[1] 2
23 pages
Lepide – Auditing, IT Security and Compliance Solutions
Lepide Privacy Policy
Awards & Reviews
Lepide’s Latest Media Coverage and Press Interviews
24 Hour Online Support for Lepide Range
NFR License
Site Map Page 1 - Generated by www.xml-sitemaps.com
sitemap.xml
Product Documentation Center for Lepide Solutions
Lepide Datasheets: Audit and Security Solutions
Case Studies - Success Stories of Lepide Solutions
Lepide Partner Reseller Program
Become an Authorised Partner of Lepide
Tell us about a new opportunity
Tell us about a new opportunity
Lepide | About Us | Our Vision and Mission
Prestigious Clients
Lepide – Meet The Team
Site Map Page 2 - Generated by www.xml-sitemaps.com
Client Testimonials of Lepide Range
Application for Sr. Technical Writer
Application for Product Developer
support-policy.pdf
    
lepideauditor50 pages
Audit Changes in Critical IT Systems with LepideAuditor
Data Discovery and Classification with LepideAuditor
Active Directory Auditing, Change Tracking & Reporting - LepideAuditor
Group Policy Auditing Solution to Audit & Report Group Policy Changes
Exchange Auditing Solution to Audit & Report Exchange Server Changes
File Server Auditing Solution to Audit and Report File Servers Changes
NetApp Filer Change Auditing & Reporting with LepideAuditor for File Server
Audit SQL Server Changes with LepideAuditor for SQL Server
SharePoint Auditing Solution to Audit and Report SharePoint Changes
Office 365 Auditing and Reporting with LepideAuditor
Dropbox Auditing and Reporting with LepideAuditor
Audit Amazon Web Services S3 Buckets with LepideAuditor
Request a Demo for LepideAuditor
Download the Trial version of LepideAuditor
Session Recording with LepideAuditor
Exchange Online Auditing and Reporting with LepideAuditor
SharePoint Online Auditing and Change Reporting with LepideAuditor
Azure AD Auditing and Reporting with LepideAuditor
OneDrive for Business Auditing and Reporting with LepideAuditor
Active Directory Cleanup Solution to Track & Manage Inactive Accounts
Monitor the Health of Active Directory, Exchange and SQL Server
Password Expiration Reminders and Notifications for Active Directory Users
Request a Quote for LepideAuditor
Restore Active Directory and Group Policy Objects with LepideAuditor
Free Change Auditing and Reporting Solution for Critical IT Systems
LepideAuditor SIEM (Security Information and Event Management) Integrations
LepideAuditor - Awards & MVP Reviews
LepideAuditor App to Get Real Time Change Notifications on Android and iOS Devices
Permission change analysis of Active Directory, Exchange and File Servers with LepideAuditor
Current Permission Analysis of Shared Files and Folders on File Server
Active Directory Change Reporting with Lepide Active Directory Auditor
Track Active Directory Changes in Real Time with Lepide AD Auditor
Active Directory Permission Auditing, Track Permission Changes with LepideAuditor
Group Policy Change Reporting with Lepide Group Policy Auditor
Track Group Policy Changes with Lepide Group Policy Auditor in Real Time
Mailbox Access Auditing to Identify Non-Owners and Owners Accesses to Exchange Mailboxes
Exchange Server Change Tracking with LepideAuditor for Exchange Server
Track File Server Changes with LepideAuditor for File Server
File Access Auditing, Permission Change Audit on File Servers with LepideAuditor
File Share Auditing with LepideAuditor for File Server
Watch Change Auditing Webcast
View Screenshots of LepideAuditor
Watch Animated Demo of LepideAuditor
Release History of LepideAuditor
lepideauditor-suite-compliance-reports.pdf
lepideauditor-suite-audit-reports.pdf
Frequently Asked Questions about LepideAuditor
lepideauditor-compliance-reports.pdf
lepideauditor-audit-reports.pdf
data-access-governance-with-lepideauditor.pdf
         
success-stories7 pages
LepideAuditor Suite gave JSR the ability to proactively track changes being made to their critical IT systems
TechWorX achieve instant insight into IT changes through the deployment of Lepide auditing solutions
Thai-Aust Aluminium used LepideAuditor Suite to help get visibility into their File and SQL Servers
LepideAuditor Suite helped Jonckers get better visibility into what changes were occurring in their Active Directory and File Servers
LepideAuditor Suite helped Zaitoona College get visibility into Active Directory and File Server changes
LepideAuditor helped Kaplan easily meet the audit and compliance requirements of PCI
LepideAuditor helped Bass Coast Health track changes in their IT Environment
    
compliance8 pages
Meet Compliance Regulations with LepideAuditor
gdpr-articles-lepideauditor-reports.pdf
Meet GDPR Compliance with LepideAuditor
Meet PCI Compliance with LepideAuditor
Meet HIPAA Compliance with LepideAuditor
Meet FISMA Compliance with LepideAuditor
Meet GLBA Compliance with LepideAuditor
Meet SOX Compliance with LepideAuditor
    
it-security4 pages
Increase security in your critical systems with the help of LepideAuditor
Insider Threat Detection and Prevention with LepideAuditor
Detect and Prevent Privilege Abuse with LepideAuditor
Ransomware Detection and Prevention with LepideAuditor
    
infographics10 pages
Infographic - 5 things you must audit in Active Directory for GDPR
Infographics about IT Audit, Compliance and Security from Lepide
Infographic - Is Your Business Prepared for the Forthcoming GDPR
Infographic - What can you do if are the victim of a Ransomware attack
Infographic - Reacting to Ransomware Attacks Like ‘Petya’
Checklist for General Data Protection Regulation (GDPR) Compliance
Three Reasons - Why Change Control Is Important for Organizations – Infographic
What you need to know to secure your Active Directory environment
How to delegate privileges to users whilst maintaining the security of Active Directory
Infographic - List of most powerful audit reports in LepideAuditor
    
whitepaper29 pages
Is Your Organization Prepared for a Cyber-Attack?
Lepide Whitepapers: Cyber-Security, Ransomware and IT Auditing
How to Discovery and Classify Data Using FSRM – Whitepaper
How Auditing Helps Meet PCI DSS Compliance - Whitepaper
Cyber Attacks: A Suggested Approach – Whitepaper – Lepide
Ransomware Predictions for 2018 - Whitepaper
SIEM-less Auditing - A Seamless Auditing Solution in Microsoft Windows – Whitepaper
Security Monitoring: The Missing Link – Whitepaper
Best Practices for Keeping Active Directory Clean – Whitepaper
Basic Principles for Securing Active Directory – Whitepaper
How to Deal with the Threat of Malicious “Cyber” Insiders - Lepide Whitepaper
Auditing, Logging and Alerting - Lepide Whitepaper
How Educational Institutions Should Prepare for GDPR Compliance
The NHS, the GDPR and the importance of automated solutions
Top 10 Ways to Avoid Privilege Abuse – Whitepaper
ransomware-detection-and-prevention-with-las.pdf
Should the NHS Outsource Information Governance – Whitepaper
Detecting Ransomware using File Server Auditing – Whitepaper
taking-active-directory-auditing-to-the-next-level.pdf
reanimating-the-deleted-objects-of-active-directory.pdf
how-to-install-exchange-2016.pdf
Avoiding privilege abuse in Active Directory
9 critical flaws in auditing Active Directory natively
Insider Threats: Trust Isn’t a Security Strategy
Improving IT Efficiency: Getting the Right Tool for the Job
Is Native Auditing really a choice?
successful-file-server-auditing-looking-beyond-native-auditing.pdf
achieving-pci-compliance-with-2020-auditsuite.pdf
whitepaper-lafs.pdf
    
news2 pages
Latest News and Updates – Lepide Software
xmlrpc.php?rsd
         
lepideauditor-18-3-now-integrates-with-any-siem-solution-and-introduces-amazon-web-services-auditing1 page
LepideAuditor 18.3 now integrates with any SIEM Solution and Introduces Amazon Web Services Auditing
         
wp-includes1 page
wlwmanifest.xml
         
category
              
product-update1 page
Product Update - Latest News and Updates – Lepide Software
                   
page
                        
21 page
Product Update - Latest News and Updates – Lepide Software - Page 2
                        
31 page
Product Update - Latest News and Updates – Lepide Software - Page 3
                        
41 page
Product Update - Latest News and Updates – Lepide Software - Page 4
                        
51 page
Product Update - Latest News and Updates – Lepide Software - Page 5
                        
71 page
Product Update - Latest News and Updates – Lepide Software - Page 7
                        
61 page
Product Update - Latest News and Updates – Lepide Software - Page 6
                        
81 page
Product Update - Latest News and Updates – Lepide Software - Page 8
                        
91 page
Product Update - Latest News and Updates – Lepide Software - Page 9
              
announcement1 page
Announcement - Latest News and Updates – Lepide Software
                   
page
                        
21 page
Announcement - Latest News and Updates – Lepide Software - Page 2
              
new-launch1 page
New Launch - Latest News and Updates – Lepide Software
                   
page
                        
21 page
New Launch - Latest News and Updates – Lepide Software - Page 2
         
lepideauditor-18-1-now-audits-cloud-components1 page
LepideAuditor 18.1 Now Audits Dropbox, Azure AD and OneDrive for Business
         
20181 page
2018 - Latest News and Updates – Lepide Software
              
071 page
2018 July - Latest News and Updates – Lepide Software
              
051 page
2018 May - Latest News and Updates – Lepide Software
              
041 page
2018 April - Latest News and Updates – Lepide Software
              
011 page
2018 January - Latest News and Updates – Lepide Software
         
20171 page
2017 - Latest News and Updates – Lepide Software
              
111 page
2017 November - Latest News and Updates – Lepide Software
              
101 page
2017 October - Latest News and Updates – Lepide Software
              
081 page
2017 August - Latest News and Updates – Lepide Software
              
061 page
2017 June - Latest News and Updates – Lepide Software
              
051 page
2017 May - Latest News and Updates – Lepide Software
              
031 page
2017 March - Latest News and Updates – Lepide Software
              
021 page
2017 February - Latest News and Updates – Lepide Software
              
011 page
2017 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2017 - Latest News and Updates – Lepide Software - Page 2
         
20161 page
2016 - Latest News and Updates – Lepide Software
              
101 page
2016 October - Latest News and Updates – Lepide Software
              
091 page
2016 September - Latest News and Updates – Lepide Software
              
081 page
2016 August - Latest News and Updates – Lepide Software
              
071 page
2016 July - Latest News and Updates – Lepide Software
              
061 page
2016 June - Latest News and Updates – Lepide Software
              
041 page
2016 April - Latest News and Updates – Lepide Software
              
031 page
2016 March - Latest News and Updates – Lepide Software
              
021 page
2016 February - Latest News and Updates – Lepide Software
              
011 page
2016 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2016 - Latest News and Updates – Lepide Software - Page 2
         
20151 page
2015 - Latest News and Updates – Lepide Software
              
121 page
2015 December - Latest News and Updates – Lepide Software
              
111 page
2015 November - Latest News and Updates – Lepide Software
              
101 page
2015 October - Latest News and Updates – Lepide Software
              
091 page
2015 September - Latest News and Updates – Lepide Software
              
081 page
2015 August - Latest News and Updates – Lepide Software
              
071 page
2015 July - Latest News and Updates – Lepide Software
              
061 page
2015 June - Latest News and Updates – Lepide Software
              
051 page
2015 May - Latest News and Updates – Lepide Software
              
041 page
2015 April - Latest News and Updates – Lepide Software
              
031 page
2015 March - Latest News and Updates – Lepide Software
              
021 page
2015 February - Latest News and Updates – Lepide Software
              
011 page
2015 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2015 - Latest News and Updates – Lepide Software - Page 2
                   
31 page
2015 - Latest News and Updates – Lepide Software - Page 3
         
20141 page
2014 - Latest News and Updates – Lepide Software
              
121 page
2014 December - Latest News and Updates – Lepide Software
              
111 page
2014 November - Latest News and Updates – Lepide Software
              
101 page
2014 October - Latest News and Updates – Lepide Software
              
081 page
2014 August - Latest News and Updates – Lepide Software
              
061 page
2014 June - Latest News and Updates – Lepide Software
              
051 page
2014 May - Latest News and Updates – Lepide Software
              
021 page
2014 February - Latest News and Updates – Lepide Software
              
011 page
2014 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2014 - Latest News and Updates – Lepide Software - Page 2
         
20131 page
2013 - Latest News and Updates – Lepide Software
              
091 page
2013 September - Latest News and Updates – Lepide Software
              
071 page
2013 July - Latest News and Updates – Lepide Software
              
061 page
2013 June - Latest News and Updates – Lepide Software
              
051 page
2013 May - Latest News and Updates – Lepide Software
              
041 page
2013 April - Latest News and Updates – Lepide Software
              
021 page
2013 February - Latest News and Updates – Lepide Software
              
011 page
2013 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2013 - Latest News and Updates – Lepide Software - Page 2
         
20121 page
2012 - Latest News and Updates – Lepide Software
              
111 page
2012 November - Latest News and Updates – Lepide Software
              
101 page
2012 October - Latest News and Updates – Lepide Software
              
091 page
2012 September - Latest News and Updates – Lepide Software
              
081 page
2012 August - Latest News and Updates – Lepide Software
              
071 page
2012 July - Latest News and Updates – Lepide Software
              
061 page
2012 June - Latest News and Updates – Lepide Software
              
051 page
2012 May - Latest News and Updates – Lepide Software
              
031 page
2012 March - Latest News and Updates – Lepide Software
              
page
                   
21 page
2012 - Latest News and Updates – Lepide Software - Page 2
         
20111 page
2011 - Latest News and Updates – Lepide Software
              
121 page
2011 December - Latest News and Updates – Lepide Software
              
011 page
2011 January - Latest News and Updates – Lepide Software
         
20101 page
2010 - Latest News and Updates – Lepide Software
              
041 page
2010 April - Latest News and Updates – Lepide Software
         
20091 page
2009 - Latest News and Updates – Lepide Software
              
101 page
2009 October - Latest News and Updates – Lepide Software
         
lepideauditor-18-0-now-including-open-share-analysis1 page
Launch of LepideAuditor 18.0 – Now Including Open Share Analysis
         
launch-of-lepideauditor-17-5-4-now-with-integrated-data-discovery-and-classification1 page
Launch of LepideAuditor 17.5.4 – Now with Integrated Data Discovery and Classification
         
lepide-launches-active-directory-self-service-18-01 page
Lepide Launches Active Directory Self Service 18.0: Now with Automated Script Execution
         
easily-meet-gdpr-compliance-with-lepideauditor-17-51 page
Easily meet GDPR compliance with LepideAuditor 17.5
         
lepidemigrator-for-exchange-moves-to-kernel1 page
LepideMigrator for Exchange moves to Kernel
         
audit-sharepoint-online-with-lepideauditor-17-41 page
Audit SharePoint Online with LepideAuditor 17.4
         
lepideauditor-17-3-with-netapp-cluster-mode-auditing1 page
Launch of LepideAuditor 17.3 – Now with NetApp Cluster Mode auditing
         
launch-of-lepideauditor-17-21 page
Launch of LepideAuditor 17.2
         
page
              
21 page
Latest News and Updates – Lepide Software - Page 2
              
31 page
Latest News and Updates – Lepide Software - Page 3
              
41 page
Latest News and Updates – Lepide Software - Page 4
              
51 page
Latest News and Updates – Lepide Software - Page 5
              
121 page
Latest News and Updates – Lepide Software - Page 12
              
111 page
Latest News and Updates – Lepide Software - Page 11
              
101 page
Latest News and Updates – Lepide Software - Page 10
              
61 page
Latest News and Updates – Lepide Software - Page 6
              
71 page
Latest News and Updates – Lepide Software - Page 7
              
91 page
Latest News and Updates – Lepide Software - Page 9
              
81 page
Latest News and Updates – Lepide Software - Page 8
         
lepide-exchange-recovery-manager-moves-to-kernel1 page
Lepide Exchange Recovery Manager moves to Kernel
         
lepide-active-directory-self-service-17-0-is-now-available1 page
Lepide Active Directory Self Service 17.0 is now available
         
lepideauditor-17-1-launched1 page
LepideAuditor 17.1 is now available
         
lepideauditor-suite-17-0-with-threshold-alerts-for-file-server-auditing1 page
Lepide launches LepideAuditor Suite 17.0 with brand new threshold alerts for File Server auditing
         
lepide-announces-launch-of-lepideauditor-suite-16-4-21 page
Lepide announces launch of LepideAuditor Suite 16.4.2 with several exciting new features for easier auditing
         
lepideauditor-suite-v16-4-launched1 page
Lepide launches the new and improved LepideAuditor Suite 16.4
         
lepide-active-directory-self-service-version-16-2-launched1 page
Lepide Software release Lepide Active Directory Self Service version 16.2
         
lepide-appoints-distology-as-their-uk-distributor1 page
Lepide appoints Distology as their UK distributor to help them grow their channel in the region
         
lepide-has-a-new-logo1 page
Lepide has a new logo!
         
lepideauditor-suite-16-3-with-file-server-current-permission-reporting1 page
LepideAuditor Suite 16.3 now comes with File Server Current Permission reporting
         
lepide-active-directory-self-service-16-1-launched1 page
Lepide Software has launched Lepide Active Directory Self Service 16.1 with a couple of new features
         
auditor-suite-16-2-launched1 page
Auditor Suite 16.2 launched with Active Directory and Exchange Server Permission Analysis
         
lepide-sql-storage-manager-is-now-available-for-free1 page
Lepide SQL Storage Manager is now available for Free
         
lepideauditor-for-exchange-server-review-won-silver-award1 page
LepideAuditor for Exchange Server Review won Silver Award
         
readers-choice-award-from-msexchange-org1 page
Reader’s Choice Award from MSExchange.org
         
lepideauditor-for-active-directory-wins-gold-award-by-windowsnetworking-team1 page
LepideAuditor for Active Directory Wins Gold Award by Windowsnetworking Team
         
lepide-software-pvt-ltd-is-proud-to-announce-that-we-are-now-a-certified-partner-of-microsoft1 page
Lepide Software Pvt Ltd is proud to announce that we are now a certified partner of Microsoft
         
lepideauditor-suite-16-1-launched1 page
LepideAuditor Suite 16.1 launched with File Server Auditor and Permission Analysis
         
lepide-active-directory-self-service-version-16-0-released1 page
Lepide Active Directory Self Service Version 16.0 Released
         
lepideauditor-suite-16-0-with-compliance-reports1 page
LepideAuditor Suite 16.0 with Regulatory Compliance Reports
         
lepide-active-directory-self-service-version-15-1-released1 page
Lepide Active Directory Self Service Version 15.1 Released
         
yet-another-new-release-to-the-lepide-auditor-suite-version-15-41 page
Yet another new release to the LepideAuditor Suite version 15.4
         
lepideauditor-suite-15-3-launched1 page
LepideAuditor Suite 15.3 launched
         
major-new-release-of-auditorsuite-from-lepide1 page
MAJOR new release of AuditorSuite from Lepide
         
lepideauditor-for-file-server-15-3-launched1 page
LepideAuditor for File Server 15.3 launched
         
lepide-software-announces-release-of-lepideauditor-for-file-server-version-15-21 page
Lepide Software announces release of LepideAuditor for File Server version 15.2
         
lepideauditor-suite-version-15-1-launched1 page
LepideAuditor Suite version 15.1 launched
         
lepide-software-announces-launch-of-new-version-15-2-of-the-lerm1 page
Lepide Software announces launch of new version (15.2) of the LERM
         
lepide-software-launches-upgraded-version-15-1-of-lepideauditor-for-file-server1 page
Lepide Software launches upgraded version 15.1 of LepideAuditor for File Server
         
lepide-software-launches-upgraded-version-of-lepide-active-directory-self-service-15-01 page
Lepide Software launches upgraded version of Lepide Active Directory Self Service 15.0
         
lepideauditor-for-file-server-version-15-0-launched1 page
LepideAuditor for File Server version 15.0 Launched
         
lepideauditor-suite-15-0-launched1 page
LepideAuditor Suite 15.0 launched
         
lepide-active-directory-self-service-version-14-12-launched1 page
Lepide Active Directory Self Service Version 14.12 launched
         
lepide-active-directory-self-service-version-14-11-launched1 page
Lepide Active Directory Self Service Version 14.11 launched
         
lepideauditor-suite-is-launched1 page
LepideAuditor Suite is launched
         
lepide-software-launched-lepide-active-directory-self-service-version-14-06-011 page
Lepide Software launched Lepide Active Directory Self Service version 14.06.01
         
lepideauditor-for-active-directory-version-14-06-01-launched1 page
LepideAuditor for Active Directory Version 14.06.01 Launched
         
lepide-software-launched-lepideauditor-for-file-server-version-14-05-011 page
Lepide Software launched LepideAuditor for File Server Version 14.05.01
         
lepide-software-announces-the-launch-of-lepideauditor-for-sharepoint1 page
Lepide Software announces the launch of LepideAuditor for SharePoint
         
lepide-active-directory-cleaner-launched1 page
Lepide Active Directory Cleaner launched
         
lepide-user-password-expiration-reminder-version-14-05-01-launched1 page
Lepide User Password Expiration Reminder Version 14.05.01 launched
         
lepide-software-announces-the-launch-of-lepideauditor-for-exchange-server-14-05-011 page
Lepide Software announces the launch of LepideAuditor for Exchange Server 14.05.01
         
lepide-software-announces-the-launch-of-lepideauditor-for-file-server-version-14-02-011 page
Lepide Software announces the launch of LepideAuditor for File Server Version 14.02.01
         
lepideauditor-for-exchange-server-released1 page
LepideAuditor for Exchange Server released
         
lepideauditor-for-active-directory-version-13-07-01-launched1 page
LepideAuditor for Active Directory version 13.07.01 launched
         
lepide-user-password-expiration-reminder-launched1 page
Lepide User Password Expiration Reminder Launched
         
lepideauditor-for-sql-server-launched1 page
LepideAuditor for SQL Server Launched
         
lepide-active-directory-bulk-image-editor-launched1 page
Lepide Active Directory Bulk Image Editor launched
         
lepide-software-launched-lepideauditor-for-file-server1 page
Lepide Software launched LepideAuditor for File Server
         
lepide-active-directory-manager-version-12-12-01-launched1 page
Lepide Active Directory Manager Version 12.12.01 launched
         
lepide-software-launched-lepideauditor-for-active-directory1 page
Lepide Software Launched LepideAuditor for Active Directory
         
lepide-event-log-manager-updated-version-launched1 page
Lepide Event Log Manager Updated Version Launched
         
lepide-active-directory-self-service-version-12-09-01-launched1 page
Lepide Active Directory Self Service version 12.09.01 launched
         
lepide-remote-admin-launched1 page
Lepide Remote Admin Launched
         
lepide-last-logon-reporter-launched1 page
Lepide Last Logon Reporter Launched
         
lepide-sql-storage-manager-launched1 page
Lepide SQL Storage Manager Launched
         
lem-version-12-05-01-launched1 page
LEM Version 12.05.01 Launched
         
ladss-updates-for-version-11-12-011 page
LADSS Updates for Version 11.12.01
         
lepide-event-log-manager-launched1 page
Lepide Event log Manager Launched
         
lepide-active-directory-self-service-tool-launched1 page
Lepide Active Directory Self Service Tool Launched
         
launched-lepide-free-tools1 page
Launched: Lepide Free Tools
    
blog2 pages
Lepide Blog: A Guide to IT Security, Compliance and IT Operations
xmlrpc.php?rsd
         
new-uk-government-cyber-security-standards-provide-framework-for-others-to-follow1 page
New UK Government Cyber Security Standards - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
lepideauditor-a-brief-comparison-to-native-office-365-auditing1 page
LepideAuditor: A Brief Comparison to Native Office 365 Auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
benefits-of-achieving-pci-compliance1 page
Benefits of Achieving PCI Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-to-audit-in-active-directory-to-meet-hipaa-compliance1 page
What to Audit in Active Directory to Meet HIPAA Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
5-things-you-need-to-audit-in-active-directory-for-gdpr1 page
5 Things You Need to Audit in Active Directory for GDPR - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
is-your-business-prepared-for-the-forthcoming-gdpr1 page
Is your business prepared for the forthcoming GDPR? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
keeping-your-active-directory-secure-when-delegating-privileges-to-users1 page
Keeping your Active Directory secure when delegating privileges to users - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
out-of-control-domain-administrators1 page
Out of Control: Domain Administrators - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
securing-your-active-directory-environment-what-you-need-to-know1 page
Securing your Active Directory environment – What you need to know - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-lepideauditor-helps-implement-the-principle-of-least-privilege1 page
How LepideAuditor helps implement the Principle of Least Privilege - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
wp-includes1 page
wlwmanifest.xml
         
author
              
phillip-robinson1 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
                        
51 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
                        
91 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 9 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 9
                        
61 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
                        
71 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
                        
81 page
Philip Robinson, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 8 of 9 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 8
              
mike1 page
Mike Smith, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
aidan1 page
Aidan Simister, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Aidan Simister, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 3 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
Aidan Simister, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3 of 3 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
              
barrym1 page
Barrington Malcolm, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
danny1 page
Danny Murphy, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
satyendra1 page
Satyendra, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Satyendra, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 4 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
Satyendra, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3 of 4 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
Satyendra, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4 of 4 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
              
r-smith1 page
Russell Smith, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Russell Smith, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
jason1 page
Jason Coggins, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
ajit-singh1 page
Ajit Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Ajit Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
kanika-agarwal1 page
Kanika Agarwal, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Kanika Agarwal, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
renu-bhaskaran1 page
Renu Bhaskaran, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Renu Bhaskaran, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
amritesh-singh1 page
Amritesh Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Amritesh Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
abhishek1 page
Abhishek Rai, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Abhishek Rai, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
keshav-arora1 page
Keshav Arora, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
guest-author1 page
Guest Author, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
r-h-sheldon1 page
R. H. Sheldon, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
umendra1 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
                        
51 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
                        
71 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
                        
61 page
Umendra Singh, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
              
krishna1 page
Krishna, Author at Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
category
              
it-security1 page
IT Security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
IT Security Archives - Page 2 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
IT Security Archives - Page 3 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
IT Security Archives - Page 4 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
                        
51 page
IT Security Archives - Page 5 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
                        
91 page
IT Security Archives - Page 9 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 9
                        
61 page
IT Security Archives - Page 6 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
                        
71 page
IT Security Archives - Page 7 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
                        
81 page
IT Security Archives - Page 8 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 8
                        
101 page
IT Security Archives - Page 10 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 10
                        
111 page
IT Security Archives - Page 11 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 11
                        
131 page
IT Security Archives - Page 13 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 13
                        
121 page
IT Security Archives - Page 12 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 12
                        
141 page
IT Security Archives - Page 14 of 14 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 14
              
auditing1 page
Auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Auditing Archives - Page 2 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
Auditing Archives - Page 3 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
Auditing Archives - Page 4 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
                        
51 page
Auditing Archives - Page 5 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
                        
61 page
Auditing Archives - Page 6 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
                        
71 page
Auditing Archives - Page 7 of 7 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
              
compliance1 page
Compliance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Compliance Archives - Page 2 of 4 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
Compliance Archives - Page 3 of 4 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
Compliance Archives - Page 4 of 4 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
              
it-operations1 page
IT Operations Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
IT Operations Archives - Page 2 of 3 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
IT Operations Archives - Page 3 of 3 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
              
ransomware1 page
Ransomware Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
Ransomware Archives - Page 2 of 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
general1 page
General Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
                   
page
                        
21 page
General Archives - Page 2 of 5 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
                        
31 page
General Archives - Page 3 of 5 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
                        
41 page
General Archives - Page 4 of 5 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
                        
51 page
General Archives - Page 5 of 5 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
         
why-it-is-important-to-know-where-your-data-flows1 page
Why it is Important to Know Where Your Data Flows - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
audit-successful-logon-logoff-and-failed-logons-in-activedirectory1 page
How to Audit Successful Logon/Logoff and Failed Logons in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-are-the-common-root-causes-of-account-lockouts-and-do-i-resolve-them1 page
What are the common root causes of account lockouts and do I resolve them - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
top-10-most-important-group-policy-settings-for-preventing-security-breaches1 page
Top 10 Most Important Group Policy Settings for Preventing Security Breaches - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-lepide-checklist-for-gdpr-compliance1 page
The Lepide Checklist for GDPR Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
7-reasons-why-healthcare-is-a-prime-target-for-cyber-criminals1 page
7 Reasons Why Healthcare Is A Prime Target for Cyber Criminals - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
4-ways-to-measure-your-cyber-security-effectiveness1 page
4 Ways to Measure Your Cyber-Security Effectiveness - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-difference-between-windows-active-directory-and-azure-ad1 page
The Difference Between Windows Active Directory and Azure AD - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-hidden-costs-of-a-ransomware-attack1 page
The Hidden Costs of a Ransomware Attack - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-native-auditing-fails-when-it-comes-to-group-policy-auditing1 page
Why Native Auditing Fails When It Comes to Group Policy Auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
lessons-learned-from-the-dixons-carphone-gdpr-breach1 page
Dixons Carphone: Lessons from the First High Profile GDPR Data Breach - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
hipaa-the-difference-between-the-privacy-and-security-rules1 page
HIPAA: The Difference Between the Privacy and Security Rules - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
page
              
21 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
31 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
              
41 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
              
51 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
              
221 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 22
              
191 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 19
              
171 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 17
              
161 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 16
              
151 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 15
              
141 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 14
              
61 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
              
71 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
              
131 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 13
              
101 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 10
              
111 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 11
              
121 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 12
              
81 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 8
              
91 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 9
              
181 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 18
              
211 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 21
              
201 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 20
              
231 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 23
              
241 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 24
              
251 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 25
              
261 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 26
              
271 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 27
              
281 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 28
              
291 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 29
              
301 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 30
              
311 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 31
              
321 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 32
              
331 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 33
              
341 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 34
         
how-to-perform-an-it-risk-assessment1 page
How to Perform an IT Risk Assessment - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
times-almost-up-are-you-ready-for-gdpr1 page
Time’s Almost Up – Are You Ready For GDPR? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
healthcare-public-administration-still-plagued-by-insider-threats1 page
Healthcare & Public Administration Still Plagued by Insider Threats - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
14-mistakes-companies-make-in-preparation-for-gdpr1 page
14 Mistakes Companies Make in Preparation for GDPR - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-puzzling-mathematics-of-white-space-in-exchange-database1 page
The Puzzling Mathematics of ‘White Space’ in Exchange Database - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
does-compliance-have-a-bad-reputation1 page
Does Compliance Have a Bad Reputation? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ransomware-should-you-pay-the-ransom1 page
Ransomware: Should you Pay the Ransom? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-you-can-improve-data-integrity-in-3-easy-steps1 page
How You Can Improve Data Integrity in 3 Easy Steps - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
understanding-internal-controls-in-the-finance-industry1 page
Understanding Internal Controls in the Finance Industry - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
seven-steps-to-better-active-directory-privileged-access-management1 page
7 Steps to Better Active Directory Privileged Access Management - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
nine-ways-to-address-ransomware-attacks-in-todays-security-landscape1 page
9 Ways to Address Ransomware Attacks in Today’s Security Landscape - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-compliance-and-data-protection-what-you-need-to-know1 page
GDPR Compliance and Data Protection: What You Need to Know - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-can-financial-services-sector-be-protected-from-cyber-crime1 page
How can Financial Services Protect Themselves from Cybercrime - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-important-are-global-threat-intelligence-services-to-your-defense-strategy1 page
How Important are Global Threat Intelligence Services to your Defense Strategy - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-compliance-your-questions-answered1 page
GDPR Compliance: Your Questions Answered - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
eight-ways-lepideauditor-trumps-native-auditing1 page
8 Ways LepideAuditor Trumps Native Auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ransomware-in-2018-will-it-be-worse-than-20171 page
Ransomware in 2018: Will it be worse than 2017? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-active-directory-logon-controls-simply-arent-enough1 page
Why Active Directory Logon Controls Simply Aren’t Enough - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
a-closer-look-at-insider-threats-in-the-financial-sector1 page
A Closer Look at Insider Threats in the Financial Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
privileged-access-management-six-ways-it-fails-and-how-to-deal-with-it1 page
Privileged Access Management: 6 Ways it Fails and How to Deal With it - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
five-security-principles-to-prevent-data-breaches-immediately1 page
Five Security Principles to Prevent Data Breaches Immediately - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
seven-ways-to-secure-critical-data-in-the-government-sector1 page
7 Ways to Secure Critical Data in the Government Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-top-five-mistakes-executives-make-following-a-data-breach1 page
The Top 5 Mistakes Executives Make Following a Data Breach - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-and-hipaa-what-are-the-key-differences1 page
GDPR and HIPAA: What are the key differences? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
a-wolf-in-sheeps-clothing-identifying-malicious-insiders1 page
A Wolf in Sheep’s Clothing: Identifying Malicious Insiders - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-role-of-hipaa-compliance-in-the-protection-of-patient-data1 page
The Role of HIPAA Compliance in the Protection of Patient Data - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
nine-ways-to-prevent-ex-employees-from-compromising-it-security1 page
Nine ways to Prevent Ex-employees from Compromising IT security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-real-time-data-monitoring-is-essential-in-preventing-security-threats1 page
Why Real-Time Data Monitoring is Essential in Preventing Security Threats - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
more-than-forty-of-companies-dont-know-where-their-data-is-stored1 page
More than 40% of Companies Don’t Know Where their Data is Stored - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
top-10-ways-to-secure-your-file-servers1 page
Top 10 Ways to Secure Your File Servers - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-pros-and-cons-of-being-a-system-administrator1 page
The Pros and Cons of Being a System Administrator - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-you-need-to-audit-privileged-access-in-active-directory1 page
Why You Need to Audit Privileged Access in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-lepideauditor-addresses-compliance-in-the-finance-sector1 page
How LepideAuditor Addresses Compliance in the Finance Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
eight-simple-ways-to-spot-a-potential-security-breach-with-lepideauditor1 page
8 Simple Ways to Spot a Potential Security Breach with LepideAuditor - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ten-ways-to-prevent-network-security-breaches-in-the-workplace1 page
10 Ways to Prevent Network Security Breaches in the Workplace - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
nine-tips-for-preventing-misuse-of-service-accounts-in-active-directory1 page
9 Tips for Preventing misuse of Service Accounts in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-biggest-threat-to-your-it-security-employee-negligence1 page
The Biggest Threat to Your IT Security? Employee Negligence - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-do-we-know-about-bad-rabbit-and-what-can-businesses-do-to-protect-themselves1 page
What do We Know About “Bad Rabbit”, and What can Businesses do to Protect Themselves - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-will-the-new-data-protection-bill-affect-your-company1 page
How will the new Data Protection Bill affect your company - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
staying-compliant-with-the-gdpr-best-practices1 page
Staying Compliant with the GDPR: Best Practices - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
dpos-gdpr-frequently-asked-questions1 page
DPOs and GDPR: Frequently Asked Questions - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-and-privacy-by-design1 page
GDPR And Privacy by Design - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
six-simple-ways-to-ensure-data-access-governance-for-file-server-with-lepideauditor1 page
6 Simple Ways to Ensure Data Access Governance for File Server with LepideAuditor - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
overcoming-the-limitations-of-siem-solutions-with-lepideauditor1 page
Overcoming the Limitations of SIEM Solutions with LepideAuditor - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
10-reasons-why-you-need-lepideauditor1 page
10 Reasons Why You Need LepideAuditor - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
top-10-things-to-audit-in-active-directory1 page
Top 10 Things to Audit in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
protecting-your-active-directory-permissions1 page
Protecting your Active Directory Permissions - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
understanding-windows-event-forwarding1 page
Understanding Windows Event Forwarding - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-qualities-you-need-to-be-a-good-system-administrator1 page
The qualities you need to be a good System Administrator - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
data-breach-horror-stories-the-worst-breaches-of-2017-so-far1 page
Data Breach Horror Stories: The Worst Breaches of 2017 so far - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
nhs-ransomware-attack-could-have-been-avoided-says-the-national-audit-office1 page
NHS Ransomware Attack Could Have Been Avoided Says the National Audit Office - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
governance-risk-and-compliance-an-easy-solution-to-a-difficult-challenge1 page
Governance, Risk and Compliance: An Easy Solution to a Difficult Challenge - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
responding-to-events-that-indicate-ransomware-and-insider-threats1 page
Responding to Events that Indicate Ransomware, Insider Threats, and other Egregious Attacks - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-mastering-the-principle-of-least-privilege-is-essential1 page
Why Mastering the Principle of Least Privilege is Essential - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
6-ways-lepideauditor-helps-increase-security-in-the-healthcare-sector1 page
6 Ways LepideAuditor Helps Increase Security in the Healthcare Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
9-reasons-your-organization-needs-a-data-loss-prevention-plan1 page
9 Reasons your Organization Needs a Data Loss Prevention Plan - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
security-best-practices-for-active-directory1 page
Security Best Practices for Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
7-ways-to-protect-active-directory-against-security-threats-using-lepideauditor1 page
7 Ways to Protect Active Directory Against Security Threats using LepideAuditor - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-can-hospitals-do-to-protect-themselves-from-cyber-attacks1 page
What can Hospitals do to Protect Themselves from Cyber-Attacks? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
siem-vs-real-time-event-detection-and-reporting1 page
SIEM vs Real-time Event Detection and Reporting - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
implementing-least-privilege-security1 page
Implementing Least Privilege Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-importance-of-separating-duties-and-auditing-critical-changes1 page
The Importance of Separating Duties and Auditing Critical Changes - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-will-the-new-uk-data-protection-laws-affect-your-business1 page
How will the new UK Data Protection Laws affect your Business? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
5-ways-not-monitoring-group-policy-changes-can-lead-to-disaster1 page
5 Ways not Monitoring Group Policy Changes can Lead to Disaster - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
smbs-and-cost-effective-data-protection1 page
SMBs and Cost Effective Data Protection - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
10-things-to-look-for-in-a-file-auditing-solution1 page
The Top 10 Things to Look for in a File Auditing Solution - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
10-tips-for-securing-windows-file-servers1 page
10 Tips for Securing Windows File Servers - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-can-you-do-if-youve-become-the-victim-of-a-ransomware-attack1 page
What can you do if you’ve become the victim of a ransomware attack? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
3-ways-to-help-stop-data-leakage-in-your-organisation1 page
3 Ways to Help Stop Data Leakage in Your Organisation - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
5-policies-that-can-help-keep-your-active-directory-secure1 page
5 policies that can help keep your Active Directory secure - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
securing-domain-controllers-by-auditing-active-directory1 page
Securing Domain Controllers by Auditing Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
healthcare-breaches-is-there-light-at-the-end-of-the-tunnel1 page
Healthcare Breaches – Is there light at the end of the tunnel? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
8-different-methods-to-identify-privileged-users1 page
8 Different Methods to Identify Privileged Users - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
is-pro-activity-the-best-way-to-deal-with-insider-threats1 page
Is pro-activity the best way to deal with insider threats? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-number-of-data-breaches-are-increasing-at-record-pace1 page
The Number of Data Breaches are Increasing at “Record Pace”, According to New Report - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
a-lesson-in-password-policy-and-it-security-from-peep-show1 page
A Lesson in Password Policy and IT Security from Peep Show - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
10-steps-must-take-to-secure-active-directory1 page
10 Critical Steps All Companies Must Take to Secure Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
4-ways-the-sweden-data-leak-could-have-been-avoided1 page
4 Ways the Sweden Data Leak Could Have Been Avoided - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
do-you-still-need-a-siem1 page
Do you still need a SIEM? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
every-member-of-staff-has-a-role-to-play-in-protecting-company-data1 page
Every member of staff has a role to play in protecting company data - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
auditing-and-monitoring-of-active-directory-whats-the-difference1 page
Auditing and monitoring of Active Directory – what’s the difference? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-detect-if-a-user-has-excessive-permissions-on-shared-folders1 page
How to detect if a user has excessive permissions on shared folders - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
common-mistakes-employees-make-that-lead-to-data-leakage1 page
Common Mistakes Employees Make That Lead to Data Leakage - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
reacting-to-the-petya-ransomware-attack-what-can-you-do1 page
Reacting to the ‘Petya’ Ransomware Attack: What Can You Do? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
our-checklist-for-preventing-data-breaches1 page
Our Checklist for Preventing Data Breaches - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
reporting-on-historical-events-in-active-directory1 page
Reporting on historical events in Active Directory made easy - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
top-10-ways-to-stop-insider-threats1 page
Top 10 ways to stop insider threats - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
file-server-auditing-made-easy1 page
File Server auditing made easy - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
survey-finds-many-organizations-are-at-risk-from-insider-threats1 page
Survey finds many organizations are at risk from insider threats - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-perform-non-owner-mailbox-access-auditing-in-exchange-20161 page
How to audit non-owner mailbox access in Exchange 2016 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
tag
              
active-directory1 page
Active Directory Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
security-21 page
security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
insider-threats-security1 page
insider threats security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
it-security1 page
it security Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
hipaa-compliance1 page
HIPAA Compliance Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
regular-auditing1 page
regular auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
critical-it-systems1 page
critical IT systems Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
auditing-strategy1 page
auditing strategy Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
active-directory-auditing-solution1 page
active directory auditing solution Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
common-security-threats1 page
common security threats Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
native-auditing1 page
native auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
active-directory-self-service1 page
Active Directory Self Service Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
self-service-password-management-solution1 page
Self Service Password Management Solution Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
event-log-manager1 page
Event Log Manager Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
file-server-auditing1 page
file server auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
internet-of-things1 page
Internet of Things Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
iot1 page
IOT Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
it1 page
IT Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
cyber-attack1 page
cyber attack Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
sharepoint1 page
SharePoint Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
lepideauditor-suite1 page
LepideAuditor suite Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
active-directory-auditing1 page
Active Directory auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
              
auditing1 page
Auditing Archives - Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
18-things-it-auditors-need-to-know1 page
18 Things IT Auditors Need to Know - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
restore-deleted-objects-in-active-directory1 page
Restore Deleted Objects in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
270000-customers-may-be-affected-by-wonga-data-breach1 page
270,000 customers may be affected by Wonga data breach - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
it-auditing-and-configuration-drift1 page
IT Auditing and Configuration Drift - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
nine-tips-on-preparing-for-and-passing-your-next-it-audit1 page
Nine Tips on Preparing For and Passing Your Next IT Audit - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
lepideauditor-suite-review-by-tom-lowson1 page
LepideAuditor Suite Review By Tom Lowson - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
three-reasons-why-change-control-is-important1 page
3 Reasons Why Change Control Is Important - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
protect-active-directory-against-security-configuration-drift1 page
Protecting Your Active Directory Against Security Configuration Drift - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
file-server-auditing-as-a-tool-for-ensuring-compliance1 page
File Server Auditing as a Tool for Ensuring Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
best-practices-for-active-directory-audit-logging1 page
Best Practices for Active Directory Audit Logging - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
protect-privileged-credentials-using-windows-server-2016-pam1 page
Protecting Privileged Credentials Using Windows Server 2016 PAM - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
pci-compliance-for-active-directory-administrators1 page
PCI Compliance for Active Directory Administrators - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
improve-file-server-security-using-abe1 page
Improve File Server Security Using Access-Based Enumeration (ABE) - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
cia-triad-the-basic-principals-of-data-security1 page
CIA triad – The Basic Principals of Data Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
do-you-really-need-a-dpo1 page
Do you really need a DPO? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
heres-what-you-need-to-know-about-gdpr-including-how-it-will-be-affected-by-brexit1 page
Here’s what you need to know about GDPR – including how it will be affected by Brexit - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-state-of-it-auditing-today1 page
The state of IT auditing today - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
it-security-roundup-july-august-20161 page
IT Security Roundup – July/August 2016 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
track-of-file-folder-access-modification-and-location1 page
How to keep track of file/folder access, modification and location - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
auditing-things-all-it-departments-need-to-know1 page
Things all IT departments need to know about IT auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
hipaa-compliance-how-to-avoid-getting-caught-out1 page
HIPAA Compliance – how to avoid getting caught out - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-perform-current-permission-analysis-with-file-server-auditor1 page
How to perform current permission analysis with File Server Auditor - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-to-look-for-when-choosing-the-right-active-directory-auditing-solution1 page
What to look for when choosing the right Active Directory auditing solution - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
insider-security-threats-common-mistakes-organizations-make-and-how-to-avoid-them1 page
Insider security threats: common mistakes organizations make and how to avoid them - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-we-learnt-at-infosec-20161 page
What we learnt at InfoSec 2016 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
security-and-the-need-for-user-account-auditing1 page
Security and the need for user account auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
who-what-when-and-where-auditing-your-it-systems1 page
Who, What, When, and Where – the things you need to know when auditing your IT environment - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
top-10-audit-reports-for-it-teams1 page
Top 10 Audit Reports for IT Teams - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
identify-server-files-have-been-deleted1 page
Best practice for auditing and monitoring file/folder level activity - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-dont-gartner-do-a-quadrant-for-it-auditing1 page
Why don’t Gartner do a quadrant for IT auditing? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
guarantee-a-merry-christmas-with-lepideauditor-suite1 page
Guarantee a merry Christmas with LepideAuditor Suite - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
9-critical-flaws-in-auditing-active-directory-natively1 page
9 critical flaws in auditing Active Directory natively - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
to-audit-or-not-to-audit-that-is-the-question1 page
To audit or not to audit… that is the question - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
nine-simple-tips-to-secure-the-active-directory1 page
Nine simple tips to secure the Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-ad-inactive-accounts-harm-security1 page
Do inactive accounts harm the Active Directory network security? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
does-forcing-users-to-change-passwords-more-frequently-really-amount-to-increased-security1 page
Does forcing users to change passwords more frequently really amount to increased security? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
active-directory-security-tips1 page
Real world practical tips to make Active Directory security a sure thing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
securing-domain-controllers-to-protect-active-directory-why-and-how1 page
Securing Domain Controllers to Protect Active Directory – Why and How? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-come-up-with-a-better-password-management-system1 page
How to come up with a Better Password Management System - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-securely-use-a-self-service-password-reset-solution1 page
Best Practice: How to Securely Use a Self-Service Password Reset Solution - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
is-windows-azure-active-directory-for-you1 page
Is Windows Azure Active Directory for You? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-tackle-malicious-password-attacks1 page
How to tackle malicious password attacks and reduce costs involved in servicing legitimate account lockouts - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
new-compliance-regulations-and-their-implications-on-your-business1 page
New Compliance Regulations and their Implications on Your Business - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
protecting-credit-card-data-should-be-a-top-priority1 page
Protecting Credit Card Data Should be a Top Priority - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-you-need-centralized-event-log-management1 page
Why you need centralized event log management - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-event-log-monitoring-programs-work1 page
How Event Log monitoring programs work - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
effectively-manage-network-wide-event-collection-and-auto-correlation1 page
Effectively manage Network wide event collection and auto-correlation - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
remove-log-size-restrictions-with-lelm1 page
Remove log size restrictions with LELM - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
event-log-management-script-tools-vs-standalone-utilities1 page
Event log management script tools Vs standalone utilities - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
event-log-monitoring1 page
Event Log Monitoring - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
syslog-based-centralized-log-management-with-event-log-manager1 page
Syslog based centralized log management with event log manager - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-securing-data-access-across-windows-servers-help-organizations-to-better-manage-their-shared-data1 page
How securing data access across Windows Servers help organizations to better manage their shared data - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
dynamic-access-control-for-file-server-21 page
Dynamic Access Control for File Server – Part 2 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
audit-file-access-and-share-with-lepideauditor-for-file-server1 page
Auditing File Access and File Share using LepideAuditor for File Server - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
dynamic-access-control-for-file-server-11 page
Dynamic Access Control for File Server – Part 1 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
can-third-party-windows-server-auditors-work-on-android-platform1 page
Can Third Party Windows Server Auditors Work on Android Platform? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
prerequisites-for-hassle-free-file-server-auditing1 page
Prerequisites for hassle-free File Server Auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
lepide-software-launches-lepideauditor-for-file-server1 page
Lepide Software Launches LepideAuditor for File Server - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
are-it-and-efficiency-mutually-exclusive1 page
Are IT and Efficiency Mutually Exclusive? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
internet-of-things-part-21 page
Moving towards a Smarter Internet: Internet of Things Part II (Present, Challenges & Opportunities) - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
upgrade-windows-server-2003-to-latest-one1 page
Countdown Begins! It’s High Time to Upgrade Windows Server 2003 to Latest One - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
internet-of-things-part-11 page
Moving towards a Smarter Internet: Internet of Things Part I (Present, Challenges, Threats & Opportunities) - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
analyzing-organizational-cyberspace-security-sony-hack1 page
Analyzing Organizational Cyberspace Security in the Awakening of Sony Hack - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
forecasting-technology-trends-20151 page
Forecasting Technology Trends 2015: Stand up and Take Notice! - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-third-party-tools-to-manage-server-and-networking-infrastructure1 page
Why Select Third-Party Tools to Manage Server and Networking Infrastructures? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-techies-need-to-slow-down-for-better-health1 page
Why Techies Need To Slow Down For Better Health - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
10-statements-to-ruin-your-day1 page
10 statements to ruin your day - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
death-of-a-salesman1 page
Death of a salesman - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
like-us-vote-for-our-products1 page
Like us. Vote for our products - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
last-logon-reporter-tool1 page
Last logon Reporter Tool - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-panama-papers-what-we-know-so-far1 page
The Panama Papers – What we know so far - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
can-ex-employees-sabotage-your-it-assets-at-their-will1 page
Can ex-employees sabotage your IT assets at their will? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
security-vs-trust1 page
Security vs. Trust – It’s all about Behavior - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ashley-madison-data-leak-what-are-the-lessons1 page
Ashley Madison data leak – What are the lessons? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
minimalize-the-risk-and-protect-yourself-from-thwarting-cyber-attacks1 page
Minimalize the risk and protect yourself from thwarting cyber-attacks - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ten-it-admin-mistakes-that-can-be-expensive-on-security-and-productivity-fronts1 page
Ten IT admin mistakes that can be expensive on security and productivity fronts - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
administration-duties-for-improved-security-and-change-control1 page
3 Ways to Separate Administration Duties for Improved Security and Change Control - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
failure-to-secure-end-user-devices-leaves-servers-and-data-at-risk1 page
Failure to Secure End-User Devices Leaves Servers and Data at Risk - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
bring-sql-server-management-studio-on-mobile1 page
A Thought to Bring the SQL Server Management Studio on Mobile - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
are-you-using-sql-server-management-studio-effectively1 page
Are You Using SQL Server Management Studio effectively? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
manage-stored-sql-mdf-files-and-improve-sql-server-performance1 page
Manage stored SQL MDF files and improve SQL server performance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
enhance-sql-database-performance-with-sql-storage-manager1 page
Enhance SQL database performance with SQL storage manager - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
tips-for-surviving-an-it-audit1 page
Tips for Surviving an IT Audit - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
auditing-account-management-and-directory-service-access1 page
Auditing Account Management and Directory Service Access in Windows Server 2012 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
stay-safe-of-security-risks-this-holiday-season1 page
Stay safe of security risks this holiday season - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ad-user-management-with-powershell1 page
Active Directory User Management using Windows PowerShell - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
troubleshoot-ad-account-lockouts1 page
Troubleshoot account lockouts and manage employee productivity - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
common-mistakes-by-admins-in-log-analysis1 page
Common mistakes made by Admins during log analysis - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
overcoming-the-limitations-of-native-ad-auditing-with-laad1 page
Overcoming the limitations of Native Auditing with LepideAuditor for Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
manage-password-expiration-in-active-directory1 page
An effective way to manage password expiration in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
audit-sql-server-for-advanced-server-performance1 page
Audit SQL Server for restraining data threats and experience advanced server performance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
factors-to-be-considered-while-performing-an-active-directory-security-audit1 page
Factors to be considered while performing an active directory security audit - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
use-active-directory-self-service-to-meet-ad-challenges1 page
Use Active Directory self service to meet AD challenges - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ad-management-complexities-and-need-of-self-service-facility1 page
AD management complexities and need of self service facility - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
get-over-identity-management-obstacles-with-ad-self-service1 page
Get over Identity Management obstacles with AD Self Service - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-adss-is-important-to-increase-organizations-productivity1 page
How ADSS is important to increase organizations productivity - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
automatic-directory-update-with-self-service1 page
Automatic directory update with self service - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
active-directory-user-rights-management1 page
Active Directory User rights management - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
enable-ad-recycle-bin1 page
Enable AD Recycle Bin - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
self-service-applications-for-active-directory1 page
Self service applications for Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
end-user-self-service-through-scsm-portal-but-is-it-enough1 page
End user self service through SCSM portal- But is it enough? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-do-siem-solutions-help-mitigate-advanced-persistent-threats-apt1 page
How do SIEM Solutions Help Mitigate Advanced Persistent Threats (APT)? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-future-of-data-protection-in-the-uk1 page
The Future of Data Protection in the UK - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
prevent-petya-and-other-ransomware-attacks-by-disabling-smbv11 page
Prevent Petya and other Ransomware attacks by disabling SMBv1 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
remove-users-admin-rights-to-prevent-insider-hacks1 page
Remove Admin Rights from Users to Prevent Insider Hacks - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
businesses-are-failing-to-report-their-most-disruptive-data-breaches1 page
Businesses are Failing to Report Their Most Disruptive Data Breaches - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
3-things-the-deloitte-breach-can-teach-you-about-mastering-it-security1 page
3 Things the Deloitte Breach Can Teach You About Mastering IT Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
is-gdpr-enforceable-in-practice-outside-of-the-eu1 page
Is GDPR Enforceable in Practice Outside of the EU? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
insider-threats-5-ways-protect-and-secure-sensitive-data1 page
Insider Threats: 5 Ways your Company Can Protect and Secure Sensitive Data - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-importance-of-data-classification1 page
The Importance of Data Classification - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-choose-lepideauditor-over-native-auditing-for-it-security-and-compliance1 page
Why choose LepideAuditor over Native Auditing for IT Security and Compliance? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-automated-response-is-critical-to-it-security1 page
Why Automated Response is Critical to IT Security and how Lepide helps - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
top-10-risks-to-active-directory-security1 page
Top 10 Risks to Active Directory Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gearing-up-to-fight-ransomware-attacks1 page
Gearing up to Fight Ransomware Attacks - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-lepideauditor-overcomes-the-limitations-of-auditing-office-365-natively1 page
How LepideAuditor Overcomes the Limitations of Auditing Office 365 Natively - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
overcoming-common-visibility-issues-with-exchange-server-auditing1 page
Overcoming Common Visibility Issues with Exchange Server Auditing - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
cyber-security-awareness-checklist-for-financial-institutions1 page
Cyber Security Awareness Checklist for Financial Institutions - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-steps-can-law-firms-take-to-protect-their-confidential-data1 page
What Steps can Law Firms take to Protect their Confidential Data? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
uber-uncool-do-we-really-know-how-many-data-breaches-there-are1 page
Uber-Uncool: Do We Really Know How Many Data Breaches There Are? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
privileged-users-growing-threat-to-your-it-security1 page
A Growing Threat to your IT Security: Privileged Users - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-use-active-directory-services-to-meet-security-and-compliance-requirements1 page
How to use Active Directory Services to Meet Security and Compliance Requirements - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
improving-security-and-compliance-ten-common-active-directory-mistakes1 page
Improving Security and Compliance: 10 Common Active Directory Mistakes - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-lepideauditor-helps-increase-security-in-the-education-sector1 page
How LepideAuditor Helps Increase Security in the Education Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-the-security-reports-in-lepideauditor-help-you-protect-sensitive-data1 page
How the Security Reports in LepideAuditor Help You Protect Sensitive Data - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-will-the-gdpr-affect-companies-in-the-usa1 page
How will the GDPR Affect Companies in the USA - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ten-ways-to-improve-data-security1 page
10 Ways to Improve Data Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
eight-technologies-financial-institutions-should-be-aware-of1 page
8 Technologies Financial Institutions Should Be Aware Of - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
insider-threats-in-healthcare-280000-medicaid-patient-records-hacked1 page
Insider Threats in Healthcare: 280,000 Medicaid Patient Records Hacked - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ten-predictions-for-it-security-in-20181 page
10 Predictions for IT Security in 2018 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-can-financial-institutions-prevent-and-recover-from-a-data-breach1 page
How can Financial Institutions Prevent and Recover from a Data Breach - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-can-educational-institutions-respond-to-the-growing-threat-of-a-cyber-attack1 page
How can Educational Institutions Respond to the Growing Threat of a Cyber-Attack? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-10-biggest-data-security-problems-in-the-healthcare-industry1 page
The 10 Biggest Data Security Problems in the Healthcare Industry - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
pci-3-2-best-practices-will-soon-be-mandatory-prepare-yourself-for-february-1st-20181 page
PCI 3.2 Best Practices Will Soon Be Mandatory: Prepare yourself for February 1st 2018 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-would-your-organization-fare-if-faced-with-this-data-security-issue1 page
How Would Your Organization Fare if Faced with This Data Security Issue? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
have-you-left-it-unlocked-with-the-keys-in1 page
Have You Left It Unlocked with The Keys In? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
improve-file-server-security-by-delegating-outside-of-the-it-department1 page
Improve File Server Security by Delegating Outside of the IT Department - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
4-steps-to-securing-unstructured-data-for-compliance1 page
4 Steps to Securing Unstructured Data for Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
sears-and-delta-breaches-reinforce-need-for-pci-dss-compliance1 page
Sears and Delta Breaches Reinforce Need for PCI DSS Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
data-protection-officers-and-gdpr-what-you-need-to-know1 page
Data Protection Officers and GDPR: What You Need to Know - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-gdpr-really-means-for-banks-and-finance-houses1 page
What GDPR Really Means for Banks and Finance Houses - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-automated-compliance-reports-can-help-mitigate-risk-of-non-compliance1 page
How Automated Compliance Reports Can Help Mitigate Risk of Non-Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-ico-prepare-to-run-gdpr-campaign-aimed-at-consumers1 page
The ICO Prepare to Run GDPR Campaign Aimed at Consumers - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-importance-of-a-capable-compliance-manager1 page
The Importance of a Capable Compliance Manager - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-stay-compliant-with-pci-3-2-a-checklist1 page
How to Stay Compliant with PCI 3.2: A Checklist - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-threat-of-unstructured-data1 page
The Threat of Unstructured Data - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-you-need-to-audit-privileged-accounts-in-active-directory1 page
Why you Need to Audit Privileged Accounts in Active Directory - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
most-companies-think-their-active-directory-is-secure-until-they-talk-to-us1 page
Most Companies Think Their Active Directory is Secure Until They Talk to Us - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
poor-visibility-and-weak-passwords-are-putting-active-directory-at-risk1 page
Poor Visibility and Weak Passwords are Putting Active Directory at Risk - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-auditing-access-rights-and-changes-strengthen-security1 page
How Auditing Access Rights, States and Changes Helps Strengthen Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-ensure-your-active-directory-is-secure1 page
How to Ensure Your Active Directory is Secure - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
do-you-need-an-active-directory-auditing-tool1 page
Do You Need An Active Directory Auditing Tool? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-manage-privileged-users-for-better-security-and-compliance1 page
How to Manage Privileged Users for Better Security and Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-cisos-are-adapting-to-meet-the-rising-threat-of-a-cyber-attack1 page
How CISOs are Adapting to Meet the Rising Threat of a Cyber-Attack - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-prevent-data-breaches-in-the-healthcare-sector1 page
How to Prevent Data Breaches in the Healthcare Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-auditing-permissions-is-an-essential-part-of-your-it-security-plan1 page
Why Auditing Permissions is an Essential Part of Your IT Security Plan - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-problem-of-privilege-management-in-data-security1 page
The Problem of Privilege Management in Data Security - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
when-is-a-data-breach-really-considered-a-data-breach-in-the-usa1 page
When is a Data Breach Really Considered a Data Breach in the USA? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
governments-now-using-have-i-been-pwned-to-check-data-breach-status1 page
Governments Now Using “Have I Been Pwned” to Check Data Breach Status - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-we-can-learn-from-the-atlanta-ransomware-attack1 page
What We Can Learn from the Atlanta Ransomware Attack - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
ransomware-attacks-in-the-healthcare-sector1 page
Ransomware Attacks in the Healthcare Sector - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-lepideauditor-helps-meet-hipaa-compliance1 page
How LepideAuditor Helps Meet HIPAA Compliance - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
four-things-you-should-know-about-it-risk-assessments1 page
4 Things You Should Know About IT Risk Assessments - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-warning-ico-issues-record-fines-in-january1 page
GDPR Warning: ICO Issues Record Fines in January - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
how-to-be-compliant-in-20181 page
How to Be Compliant in 2018 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
why-it-security-is-inside-out1 page
Why IT Security Is Inside Out - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-myth-of-ransomware-prevention-solutions1 page
The Myth of Ransomware Prevention Solutions - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
using-change-auditing-for-an-effective-incident-response-plan1 page
Using Change Auditing for an Effective Incident Response Plan - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
have-you-forgotten-about-your-sox-compliance-audit1 page
Have you Forgotten About your SOX Compliance Audit? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-are-companies-concerned-about-the-consequence-of-non-compliance1 page
GDPR: Are Companies Concerned About the Consequence of Non-Compliance? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
local-authorities-need-to-start-preparing-for-the-gdpr1 page
Local Authorities Need to Start Preparing for the GDPR - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
gdpr-likely-to-hit-mid-market-organizations-the-hardest1 page
GDPR Likely to Hit Mid-Market Organizations the Hardest - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
reporting-a-breach-under-the-gdpr1 page
Reporting a Breach Under the GDPR - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
tesla-security-breach-highlights-lack-of-insider-monitoring1 page
Tesla Security Breach Highlights Lack of Insider Monitoring - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
security-policies-cisos-must-implement1 page
Security Policies CISOs Must Implement - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
password-policy-best-practices-our-suggestions1 page
Password Policy Best Practices – Our Suggestions - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
what-cisos-can-learn-from-the-yahoo-data-breach-fine1 page
What CISOs Can Learn from the Yahoo Data Breach Fine - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
insider-threats-preparation-best-practices-and-detection1 page
Insider Threats: Preparation, Best Practices and Detection - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
the-danger-of-delayed-threat-detection-and-how-to-prevent-it1 page
The Danger of Delayed Threat Detection and How to Prevent it - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
5-steps-for-developing-a-successful-data-access-governance-dag-program1 page
5 Steps for Developing a Successful Data Access Governance (DAG) Program - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
data-classification-the-whys-and-the-hows1 page
Data Classification: The Why’s and the How’s - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
a-year-after-wannacry-what-lessons-have-been-learned1 page
A Year After WannaCry, What Lessons Have Been Learned? - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
         
5-ways-ransomware-is-changing-in-20181 page
5 Ways Ransomware is Changing in 2018 - Lepide Blog: A Guide to IT Security, Compliance and IT Operations
    
how-to54 pages
How-to Guides to Help You Audit Your IT Infrastructure
Auditing and Reversing Active Directory Permission Changes using LepideAuditor
How to track and troubleshoot User Account Lockouts with LepideAuditor
How to Track Active Directory Users with Passwords Set to Never Expire
How to Get a List of Active Directory User Accounts Created in Last 24 hours
How to Track and Audit Active Directory Group Membership Changes
How to Manage Inactive User and Computer Accounts in Active Directory
How to Detect Last Logon Date and Time for all Active Directory Users
How to Audit Organizational Units (OUs) Changes in Active Directory
How to audit who logged into a computer and when
A Step-By-Step Guide to Restoring Deleted Objects in Active Directory
How to Track Password Changes and Resets in Active Directory
How to Monitor User Logons in Active Directory Domain
How to Track Permission Changes in Active Directory
How to Track Who Reset Password of a User in Active Directory
How to Track User and Computer Accounts Deletion in Active Directory
Audit User Account Changes in Windows Active Directory
How to Track Who Enabled a User in Active Directory
How to keep track of user creation in Active Directory
How to track Privileged Users' Activities in Active Directory
How Track Who Deleted a Group Policy Object (GPO) in Active Directory
How to delegate rights to Unlock Accounts in Active Directory
How to Track Source and Cause of Active Directory Account Lockouts
Track who, when and from where created an object in Active Directory
How to track changes made to Active Directory using native auditing
How to Enable the Security Auditing of Active Directory
How to configure the Monitoring of AD Objects in Windows Server 2012
How to Track Changes Made to Files in a Shared Folder
How to Track Permissions Applied on Files and Folders in Windows File Server
How to Track Who Accesses, Reads Files on your Windows File Servers
How to Track File and Folder Activities on Windows File Servers
Track File Deletions and Permission Changes on Windows File Servers
How to assign permissions to files and folders through Group Policy
How to Track Permission Changes on Windows File Servers
How to enable File and Folder Access Auditing on Windows Server 2012
How to track changes made to Files and Folders on Windows File Servers
How to Track and Audit Changes made to Group Policy Objects
How to Backup and Restore Group Policy Objects using PowerShell
How to Audit Permission Changes in SharePoint 2013
How to Track and Audit Changes in SharePoint Server 2016
track-most-visited-sites-in-sharepoint-2013.html
How to Track Who Accessed Mailboxes in Exchange Server 2016
A Guide to Monitor the Health Exchange Server
How to Track Permission Changes on Exchange Server Mailboxes
How to Monitor Non-Owner Mailbox Accesses on Exchange Server 2013
How to track Exchange Server Shared Mailboxes Access using EAC
How Track Change Made to Exchange 2016 by Administrators
How to Detect Mailbox Permission Changes in Exchange Online
How to Enable Auditing in SharePoint Online
A Step-By-Step Guide to Enable Mailbox Auditing of Exchange Online (Office 365)
How to Audit and Reverse User Account Changes with LepideAuditor
How to Track Soon to Expire and Expired Passwords with LepideAuditor
How to Trigger an Automated Action with LepideAuditor
How to Get Real-time Alerts on Mobile Devices with LepideAuditor
    
community 608 pages
Lepide Forums
Lepide Forums
Lepide Forums FAQ
Register at Lepide Forums
All Posts
Announcements descending order
LepideAuditor descending order
LepideAuditor for File Server descending order
Lepide Active Directory Self Service descending order
Password Expiration Reminder descending order
Event Log Manager descending order
SQL Storage Manager descending order
Free Tools descending order
LepideAuditor descending order
Board FAQ
Lepide Forums
Advanced Search - Lepide Forums-
General Forum Usage
Setting and Profile Features
Reading and Posting Messages
Search Forums - Lepide Forums
LepideMigrator for Documents version 16.2 launched - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite version 16.3 launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Active Directory Self Service 16.1 Released - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Documents v16.1 released - Reply to Topic
Search Forums - Lepide Forums
Lepide Exchange Recovery Manager v16.0 released - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite v16.2 released - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Exchange version 16. Launched - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Documents v16.0 released - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite 16.1 Launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Active Directory Self Service 16.0 Released - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Exchange 16.0 released - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite v 16.0 launched - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Exchange v 15.5 launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Active Directory Self Service Version 15.1 launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Exchange recovery Manager 15.4 launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Migrator for Documents 15.2 version is launched - Reply to Topic
Search Forums - Lepide Forums
Essential new upgrade for LepideAuditor Suite - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite 15.3 launched - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Exchange 15.4 launched - Reply to Topic
Search Forums - Lepide Forums
Dynamic New Version 15.2 of LepideAuditor Suite Launched - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Exchange 15.3 Released - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Documents 15.1 Released - Reply to Topic
Search Forums - Lepide Forums
Lepide Exchange Recovery Manager (v15.3) Released - Reply to Topic
Search Forums - Lepide Forums
Version 15.1 of LepideAuditor Suite has launched! - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor for File Server Version 15.2 Released! - Reply to Topic
Search Forums - Lepide Forums
Version 15.2 of Lepide Exchange Recovery Manager launched! - Reply to Topic
Search Forums - Lepide Forums
Lepide Software announced the release of Exchange Server Migration Services! - Reply to Topic
Search Forums - Lepide Forums
Lepide Software announced the launch of LepideMigrator for Exchange! - Reply to Topic
Search Forums - Lepide Forums
Version 15.0 of Lepide Active Directory Self Service launched! - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor for File Server Version 15.1 Launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Exchange Recovery Manager Version 15.0 launched! - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor for File Server 15.0 Launched - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite Version 15.0 launched - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor for Active Directory Version 14.06.01 Launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Software launched Lepide Active Directory Self Service version 14.06.01 - Reply to Topic
Search Forums - Lepide Forums
Lepide launches version 14.12 of Lepide Active Directory Self Service - Reply to Topic
Search Forums - Lepide Forums
Lepide SQL Storage Manager is now FREE! - Reply to Topic
Search Forums - Lepide Forums
Lepide Active Directory Self Service Version 14.11.01 launched - Reply to Topic
Search Forums - Lepide Forums
LepideMigrator for Documents - Version 14.10.01 Launched - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor Suite is launched - Reply to Topic
Search Forums - Lepide Forums
New Version 14.06.01 of Lepide Exchange Reporter launched - Reply to Topic
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Version 14.05.01 of Lepide User Password Expiration Reminder has launched - Reply to Topic
Search Forums - Lepide Forums
New updated version of the tool Lepide Exchange Reporter 13.09.01 has been launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Software launched Version 14.05.01 of LepideAuditor for File Server - Reply to Topic
Search Forums - Lepide Forums
Lepide Software announces the launch of LepideAuditor for SharePoint - Reply to Topic
Search Forums - Lepide Forums
Lepide Active Directory Cleaner launched - Reply to Topic
Search Forums - Lepide Forums
Lepide Exchange Recovery Manager Version 14.05.01 now launched - Reply to Topic
Search Forums - Lepide Forums
LepideAuditor for Exchange Server (LAES) version 14.05.01 launched - Reply to Topic
Search Forums - Lepide Forums
Enhanced Features in Lepide Exchange Recovery Manager (LERM) version 14.01.01 - Reply to Topic
Search Forums - Lepide Forums
Lepide Active Directory Manager (LADM) now available in 1 year Free Trial version. - Reply to Topic
Search Forums - Lepide Forums
Added Features in LepideAuditor for SQL Server version 14.01.01 - Reply to Topic
Search Forums - Lepide Forums
Upgraded Version of LepideAuditor for Active Directory version 13.07.01 released - Reply to Topic
Search Forums - Lepide Forums
Lepide Software Launches Lepide Exchange Reporter version 13.05.01 - Reply to Topic
Search Forums - Lepide Forums
Lepide Software launches Lepide User Password Expiration Reminder Tool - Reply to Topic
Search Forums - Lepide Forums
Lepide Software launches LepideAuditor for SQL Server - Reply to Topic
Search Forums - Lepide Forums
Lepide introduces new version of Lepide Active Directory manager 12.12.01 - Reply to Topic
Search Forums - Lepide Forums
Lepide Software launches free software Bulk Image Editor for Active Directory - Reply to Topic
Search Forums - Lepide Forums
Lepide Software launches Auditor for File Server - Reply to Topic
Search Forums - Lepide Forums
Lepide has Released updated version of Lepide Event Log Manager - Reply to Topic
Search Forums - Lepide Forums
Lepide softwares Launches Lepide Exchange Manager version 11.03.12 - Reply to Topic
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
McAfee VirusScan Entp. detects LepideAuditor Suite's executable files as threats - Reply to Topic
Search Forums - Lepide Forums
McAfee VirusScan Enterprising is blocking the emails from LepideAuditor Suite - Reply to Topic
Search Forums - Lepide Forums
I am getting message ?could not connect? while opening web console. - Reply to Topic
Search Forums - Lepide Forums
want to use Windowsauthentication instead of sql authentication to get report - Reply to Topic
Search Forums - Lepide Forums
I am not geting reports for active directory auditor--is manual setting required - Reply to Topic
Search Forums - Lepide Forums
I am failing to "enable audit". What do i need to do? - Reply to Topic
Search Forums - Lepide Forums
Health Monitoring and Audit Reports are not appearing - Reply to Topic
Search Forums - Lepide Forums
How does log collection happens for sql server auditing in auditor suite - Reply to Topic
Search Forums - Lepide Forums
Not getting any reports of Logon/ Logoff. - Reply to Topic
Search Forums - Lepide Forums
Error when running the reports "Error when converting a string into date and/or time" - Reply to Topic
Search Forums - Lepide Forums
Error-?The affinity mask specified conflicts with the affinity mask I / S specified.? - Reply to Topic
Search Forums - Lepide Forums
Uninstall agent...name/location? - Reply to Topic
Search Forums - Lepide Forums
No Auditing with LepideAuditor for Active Directory even not able to add the domain. - Reply to Topic
Search Forums - Lepide Forums
Change reports are missing when changes done through MMC in AD Auditor - Reply to Topic
Search Forums - Lepide Forums
Auditing remote server - Reply to Topic
Search Forums - Lepide Forums
Change Capture time / Agent - Reply to Topic
Search Forums - Lepide Forums
Licensing of Lepide SQL Auditor its per SQL Server or per Instances? - Reply to Topic
Search Forums - Lepide Forums
The specified @server_name ('10.207.12.220,5151') does not exist - Reply to Topic
Search Forums - Lepide Forums
Search Forums - Lepide Forums
[1] 2