HTML Site Map

Homepage Last updated: 2018, December 14
Total pages: 1574

[1] 2
27 pages
Lepide – Auditing, IT Security and Compliance Solutions
Lepide Privacy Policy
Awards & Reviews
Lepide’s Latest Media Coverage and Press Interviews
24 Hour Online Support for Lepide Range
NFR License
Site Map Page 1 - Generated by www.xml-sitemaps.com
sitemap.xml
Lepide Support
Product Documentation Center for Lepide Solutions
Lepide Datasheets: Audit and Security Solutions
Case Studies - Success Stories of Lepide Solutions
Lepide Partner Reseller Program
Become an Authorised Partner of Lepide
Tell us about a new opportunity
Tell us about a new opportunity
Lepide Alliance Partnerships
Lepide | About Us | Our Vision and Mission
Prestigious Clients
Lepide – Meet The Team
Site Map Page 2 - Generated by www.xml-sitemaps.com
Client Testimonials of Lepide Range
Application for Sr. Technical Writer
Application for Product Developer
support-policy.pdf
Lepide Professional Services
Lepide Support
    
lepideauditor54 pages
Request a Demo for LepideAuditor
Data Discovery & Classification Solution
Permissions and Privileges Analytics Solution
Environment States & Changes Auditing Solution
Audit Changes in Critical IT Systems with LepideAuditor
Active Directory Auditing, Change Tracking & Reporting - LepideAuditor
Group Policy Auditing Solution to Audit & Report Group Policy Changes
File Server Auditing Solution to Audit and Report File Servers Changes
Exchange Auditing Solution to Audit & Report Exchange Server Changes
SharePoint Auditing Solution to Audit and Report SharePoint Changes
Audit SQL Server Changes with LepideAuditor for SQL Server
Office 365 Auditing and Reporting with LepideAuditor
G Suite Auditing and Reporting with LepideAuditor
Dropbox Auditing and Reporting with LepideAuditor
Audit Amazon Web Services S3 Buckets with LepideAuditor
Schedule a Free IT Risk Assessment with Lepide
Download the Trial version of LepideAuditor
Data Access Governance Solution
Session Recording with LepideAuditor
Monitor the Health of Active Directory, Exchange and SQL Server
Password Expiration Reminders and Notifications for Active Directory Users
Restore Active Directory and Group Policy Objects with LepideAuditor
Exchange Online Auditing and Reporting with LepideAuditor
SharePoint Online Auditing and Change Reporting with LepideAuditor
Azure AD Auditing and Reporting with LepideAuditor
OneDrive for Business Auditing and Reporting with LepideAuditor
NetApp Filer Change Auditing & Reporting with LepideAuditor for File Server
Active Directory Cleanup Solution to Track & Manage Inactive Accounts
Free Change Auditing and Reporting Solution for Critical IT Systems
Active Directory Change Reporting with Lepide Active Directory Auditor
LepideAuditor App to Get Real Time Change Notifications on Android and iOS Devices
Track Active Directory Changes in Real Time with Lepide AD Auditor
Active Directory Permission Auditing, Track Permission Changes with LepideAuditor
Permission change analysis of Active Directory, Exchange and File Servers with LepideAuditor
LepideAuditor - Awards & MVP Reviews
Group Policy Change Reporting with Lepide Group Policy Auditor
Track Group Policy Changes with Lepide Group Policy Auditor in Real Time
Track File Server Changes with LepideAuditor for File Server
Current Permission Analysis of Shared Files and Folders on File Server
File Access Auditing, Permission Change Audit on File Servers with LepideAuditor
File Share Auditing with LepideAuditor for File Server
Mailbox Access Auditing to Identify Non-Owners and Owners Accesses to Exchange Mailboxes
Exchange Server Change Tracking with LepideAuditor for Exchange Server
Request a Quote for LepideAuditor
LepideAuditor SIEM (Security Information and Event Management) Integrations
Watch Change Auditing Webcast
View Screenshots of LepideAuditor
Release History of LepideAuditor
lepideauditor-suite-compliance-reports.pdf
lepideauditor-suite-audit-reports.pdf
Frequently Asked Questions about LepideAuditor
lepideauditor-compliance-reports.pdf
lepideauditor-audit-reports.pdf
data-access-governance-with-lepideauditor.pdf
         
success-stories7 pages
LepideAuditor Suite gave JSR the ability to proactively track changes being made to their critical IT systems
TechWorX achieve instant insight into IT changes through the deployment of Lepide auditing solutions
Thai-Aust Aluminium used LepideAuditor Suite to help get visibility into their File and SQL Servers
LepideAuditor Suite helped Jonckers get better visibility into what changes were occurring in their Active Directory and File Servers
LepideAuditor Suite helped Zaitoona College get visibility into Active Directory and File Server changes
LepideAuditor helped Kaplan easily meet the audit and compliance requirements of PCI
LepideAuditor helped Bass Coast Health track changes in their IT Environment
    
blog2 pages
Lepide Blog: A Guide to IT Security, Compliance and IT Operations
xmlrpc.php?rsd
         
insider-threats-dont-apply-to-me-do-they1 page
Insider Threats Don’t Apply to Me…Do They?
         
wp-includes1 page
wlwmanifest.xml
         
how-lepideauditor-can-help-companies-comply-with-ccpa1 page
How LepideAuditor Can Help Companies Comply With CCPA
         
why-siloed-data-discovery-and-classification-solutions-arent-enough1 page
Why Siloed Data Discovery and Classification Solutions Aren’t Enough
         
audit-successful-logon-logoff-and-failed-logons-in-activedirectory1 page
How to Audit Successful Logon/Logoff and Failed Logons in Active Directory
         
top-10-most-important-group-policy-settings-for-preventing-security-breaches1 page
Top 10 Most Important Group Policy Settings for Preventing Security Breaches
         
what-are-the-common-root-causes-of-account-lockouts-and-do-i-resolve-them1 page
What Are the Common Root Causes of Account Lockouts and How Do I Resolve Them?
         
5-things-you-need-to-audit-in-active-directory-for-gdpr1 page
5 Things You Need to Audit in Active Directory for GDPR
         
restore-deleted-objects-in-active-directory1 page
Restore Deleted Objects in Active Directory
         
page
              
21 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
31 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
              
41 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
              
51 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
              
221 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 22
              
191 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 19
              
171 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 17
              
161 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 16
              
151 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 15
              
141 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 14
              
61 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
              
71 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
              
131 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 13
              
101 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 10
              
111 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 11
              
121 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 12
              
81 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 8
              
91 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 9
              
181 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 18
              
211 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 21
              
201 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 20
              
231 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 23
              
241 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 24
              
251 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 25
              
261 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 26
              
271 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 27
              
281 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 28
              
291 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 29
              
301 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 30
              
311 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 31
              
321 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 32
              
331 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 33
              
341 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 34
              
351 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 35
              
361 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 36
              
371 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 37
              
381 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 38
              
391 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 39
              
401 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 40
              
411 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 41
              
421 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 42
         
what-are-intrusion-prevention-systems-and-can-they-protect-your-network-from-attacks1 page
What Are Intrusion Prevention Systems and Can They Protect Your Network from Attacks?
         
why-arent-consumers-angrier-about-data-breaches1 page
Why Aren’t Consumers Angrier About Data Breaches?
         
tips-for-mitigating-data-breaches-when-using-cloud-services1 page
Tips for Mitigating Data Breaches When Using Cloud Services
         
marriott-data-breach-all-you-need-to-know1 page
The Marriott Data Breach: All You Need to Know
         
singhealth-singapores-worst-cyber-attack-so-far1 page
SingHealth: Singapore’s Worst Cyber-Attack So Far
         
why-it-is-important-to-keep-an-eye-on-your-office-365-administrators1 page
Why It Is Important to Keep an Eye on Your Office 365 Administrators
         
benefits-of-achieving-pci-compliance1 page
Benefits of Achieving PCI Compliance
         
what-to-audit-in-active-directory-to-meet-hipaa-compliance1 page
What to Audit in Active Directory to Meet HIPAA Compliance
         
is-your-business-prepared-for-the-forthcoming-gdpr1 page
Is your business prepared for the forthcoming GDPR?
         
keeping-your-active-directory-secure-when-delegating-privileges-to-users1 page
Keeping your Active Directory secure when delegating privileges to users
         
out-of-control-domain-administrators1 page
Out of Control: Domain Administrators
         
securing-your-active-directory-environment-what-you-need-to-know1 page
Securing your Active Directory environment – What you need to know
         
how-lepideauditor-helps-implement-the-principle-of-least-privilege1 page
How LepideAuditor helps implement the Principle of Least Privilege
         
are-cisos-prepared-to-detect-cyber-security-breaches1 page
Are CISOs Prepared to Detect Cyber-Security Breaches?
         
the-lepide-checklist-for-gdpr-compliance1 page
The Lepide Checklist for GDPR Compliance
         
employee-negligence-is-biggest-cyber-security-threat-to-us-companies1 page
Employee Negligence is Biggest Cyber Security Threat to US Companies
         
timehop-breach-reminder-of-the-importance-of-password-security1 page
Timehop Breach: Reminder of the Importance of Password Security
         
what-part-does-data-access-governance-play-in-securing-unstructured-data1 page
What Part Does Data Access Governance Play in Securing Unstructured Data?
         
lepideauditor-a-brief-comparison-to-native-office-365-auditing1 page
LepideAuditor: A Brief Comparison to Native Office 365 Auditing
         
why-it-is-important-to-know-where-your-data-flows1 page
Why it is Important to Know Where Your Data Flows
         
new-uk-government-cyber-security-standards-provide-framework-for-others-to-follow1 page
New UK Government Cyber Security Standards
         
the-difference-between-windows-active-directory-and-azure-ad1 page
The Difference Between Windows Active Directory and Azure AD
         
lessons-learned-from-the-dixons-carphone-gdpr-breach1 page
Dixons Carphone: Lessons from the First High Profile GDPR Data Breach
         
hipaa-the-difference-between-the-privacy-and-security-rules1 page
HIPAA: The Difference Between the Privacy and Security Rules
         
the-hidden-costs-of-a-ransomware-attack1 page
The Hidden Costs of a Ransomware Attack
         
how-to-perform-an-it-risk-assessment1 page
How to Perform an IT Risk Assessment
         
how-active-directory-is-evolving-in-20181 page
How Active Directory is Evolving in 2018
         
why-you-simply-cannot-ignore-insider-threats-anymore1 page
Why You Simply Cannot Ignore Insider Threats Anymore
         
top-10-signs-that-your-system-has-been-compromised1 page
Top 10 Signs That Your System Has Been Compromised
         
5-phishing-techniques-to-watch-out-for-in-20181 page
5 Phishing Techniques to Watch Out for in 2018
         
7-reasons-why-healthcare-is-a-prime-target-for-cyber-criminals1 page
7 Reasons Why Healthcare Is A Prime Target for Cyber Criminals
         
4-ways-to-measure-your-cyber-security-effectiveness1 page
4 Ways to Measure Your Cyber-Security Effectiveness
         
why-native-auditing-fails-when-it-comes-to-group-policy-auditing1 page
Why Native Auditing Fails When It Comes to Group Policy Auditing
         
times-almost-up-are-you-ready-for-gdpr1 page
Time’s Almost Up – Are You Ready For GDPR?
         
healthcare-public-administration-still-plagued-by-insider-threats1 page
Healthcare & Public Administration Still Plagued by Insider Threats
         
14-mistakes-companies-make-in-preparation-for-gdpr1 page
14 Mistakes Companies Make in Preparation for GDPR
         
the-puzzling-mathematics-of-white-space-in-exchange-database1 page
The Puzzling Mathematics of ‘White Space’ in Exchange Database
         
does-compliance-have-a-bad-reputation1 page
Does Compliance Have a Bad Reputation?
         
ransomware-should-you-pay-the-ransom1 page
Ransomware: Should you Pay the Ransom?
         
how-you-can-improve-data-integrity-in-3-easy-steps1 page
How You Can Improve Data Integrity in 3 Easy Steps
         
understanding-internal-controls-in-the-finance-industry1 page
Understanding Internal Controls in the Finance Industry
         
seven-steps-to-better-active-directory-privileged-access-management1 page
7 Steps to Better Active Directory Privileged Access Management
         
nine-ways-to-address-ransomware-attacks-in-todays-security-landscape1 page
9 Ways to Address Ransomware Attacks in Today’s Security Landscape
         
gdpr-compliance-and-data-protection-what-you-need-to-know1 page
GDPR Compliance and Data Protection: What You Need to Know
         
how-can-financial-services-sector-be-protected-from-cyber-crime1 page
How can Financial Services Protect Themselves from Cybercrime
         
how-important-are-global-threat-intelligence-services-to-your-defense-strategy1 page
How Important are Global Threat Intelligence Services to your Defense Strategy
         
gdpr-compliance-your-questions-answered1 page
GDPR Compliance: Your Questions Answered
         
eight-ways-lepideauditor-trumps-native-auditing1 page
8 Ways LepideAuditor Trumps Native Auditing
         
ransomware-in-2018-will-it-be-worse-than-20171 page
Ransomware in 2018: Will it be worse than 2017?
         
why-active-directory-logon-controls-simply-arent-enough1 page
Why Active Directory Logon Controls Simply Aren’t Enough
         
a-closer-look-at-insider-threats-in-the-financial-sector1 page
A Closer Look at Insider Threats in the Financial Sector
         
privileged-access-management-six-ways-it-fails-and-how-to-deal-with-it1 page
Privileged Access Management: 6 Ways it Fails and How to Deal With it
         
five-security-principles-to-prevent-data-breaches-immediately1 page
Five Security Principles to Prevent Data Breaches Immediately
         
seven-ways-to-secure-critical-data-in-the-government-sector1 page
7 Ways to Secure Critical Data in the Government Sector
         
the-top-five-mistakes-executives-make-following-a-data-breach1 page
The Top 5 Mistakes Executives Make Following a Data Breach
         
gdpr-and-hipaa-what-are-the-key-differences1 page
GDPR and HIPAA: What are the key differences?
         
a-wolf-in-sheeps-clothing-identifying-malicious-insiders1 page
A Wolf in Sheep’s Clothing: Identifying Malicious Insiders
         
the-role-of-hipaa-compliance-in-the-protection-of-patient-data1 page
The Role of HIPAA Compliance in the Protection of Patient Data
         
nine-ways-to-prevent-ex-employees-from-compromising-it-security1 page
Nine ways to Prevent Ex-employees from Compromising IT security
         
why-real-time-data-monitoring-is-essential-in-preventing-security-threats1 page
Why Real-Time Data Monitoring is Essential in Preventing Security Threats
         
more-than-forty-of-companies-dont-know-where-their-data-is-stored1 page
More than 40% of Companies Don’t Know Where their Data is Stored
         
top-10-ways-to-secure-your-file-servers1 page
Top 10 Ways to Secure Your File Servers
         
the-pros-and-cons-of-being-a-system-administrator1 page
The Pros and Cons of Being a System Administrator
         
why-you-need-to-audit-privileged-access-in-active-directory1 page
Why You Need to Audit Privileged Access in Active Directory
         
how-lepideauditor-addresses-compliance-in-the-finance-sector1 page
How LepideAuditor Addresses Compliance in the Finance Sector
         
eight-simple-ways-to-spot-a-potential-security-breach-with-lepideauditor1 page
8 Simple Ways to Spot a Potential Security Breach with LepideAuditor
         
ten-ways-to-prevent-network-security-breaches-in-the-workplace1 page
10 Ways to Prevent Network Security Breaches in the Workplace
         
nine-tips-for-preventing-misuse-of-service-accounts-in-active-directory1 page
9 Tips for Preventing misuse of Service Accounts in Active Directory
         
the-biggest-threat-to-your-it-security-employee-negligence1 page
The Biggest Threat to Your IT Security? Employee Negligence
         
what-do-we-know-about-bad-rabbit-and-what-can-businesses-do-to-protect-themselves1 page
What do We Know About “Bad Rabbit”, and What can Businesses do to Protect Themselves
         
how-will-the-new-data-protection-bill-affect-your-company1 page
How will the new Data Protection Bill affect your company
         
staying-compliant-with-the-gdpr-best-practices1 page
Staying Compliant with the GDPR: Best Practices
         
dpos-gdpr-frequently-asked-questions1 page
DPOs and GDPR: Frequently Asked Questions
         
gdpr-and-privacy-by-design1 page
GDPR And Privacy by Design
         
six-simple-ways-to-ensure-data-access-governance-for-file-server-with-lepideauditor1 page
6 Simple Ways to Ensure Data Access Governance for File Server with LepideAuditor
         
overcoming-the-limitations-of-siem-solutions-with-lepideauditor1 page
Overcoming the Limitations of SIEM Solutions with LepideAuditor
         
10-reasons-why-you-need-lepideauditor1 page
10 Reasons Why You Need LepideAuditor
         
top-10-things-to-audit-in-active-directory1 page
Top 10 Things to Audit in Active Directory
         
protecting-your-active-directory-permissions1 page
Protecting your Active Directory Permissions
         
understanding-windows-event-forwarding1 page
Understanding Windows Event Forwarding
         
the-qualities-you-need-to-be-a-good-system-administrator1 page
The Qualities You Need to be a Good System Administrator
         
data-breach-horror-stories-the-worst-breaches-of-2017-so-far1 page
Data Breach Horror Stories: The Worst Breaches of 2017 so far
         
nhs-ransomware-attack-could-have-been-avoided-says-the-national-audit-office1 page
NHS Ransomware Attack Could Have Been Avoided Says the National Audit Office
         
governance-risk-and-compliance-an-easy-solution-to-a-difficult-challenge1 page
Governance, Risk and Compliance: An Easy Solution to a Difficult Challenge
         
responding-to-events-that-indicate-ransomware-and-insider-threats1 page
Responding to Events that Indicate Ransomware, Insider Threats, and other Egregious Attacks
         
why-mastering-the-principle-of-least-privilege-is-essential1 page
Why Mastering the Principle of Least Privilege is Essential
         
6-ways-lepideauditor-helps-increase-security-in-the-healthcare-sector1 page
6 Ways LepideAuditor Helps Increase Security in the Healthcare Sector
         
9-reasons-your-organization-needs-a-data-loss-prevention-plan1 page
9 Reasons your Organization Needs a Data Loss Prevention Plan
         
security-best-practices-for-active-directory1 page
Security Best Practices for Active Directory
         
7-ways-to-protect-active-directory-against-security-threats-using-lepideauditor1 page
7 Ways to Protect Active Directory Against Security Threats using LepideAuditor
         
what-can-hospitals-do-to-protect-themselves-from-cyber-attacks1 page
What can Hospitals do to Protect Themselves from Cyber-Attacks?
         
siem-vs-real-time-event-detection-and-reporting1 page
SIEM vs Real-time Event Detection and Reporting
         
implementing-least-privilege-security1 page
Implementing Least Privilege Security
         
the-importance-of-separating-duties-and-auditing-critical-changes1 page
The Importance of Separating Duties and Auditing Critical Changes
         
how-will-the-new-uk-data-protection-laws-affect-your-business1 page
How will the new UK Data Protection Laws affect your Business?
         
5-ways-not-monitoring-group-policy-changes-can-lead-to-disaster1 page
5 Ways not Monitoring Group Policy Changes can Lead to Disaster
         
smbs-and-cost-effective-data-protection1 page
SMBs and Cost Effective Data Protection
         
10-things-to-look-for-in-a-file-auditing-solution1 page
The Top 10 Things to Look for in a File Auditing Solution
         
10-tips-for-securing-windows-file-servers1 page
10 Tips for Securing Windows File Servers
         
what-can-you-do-if-youve-become-the-victim-of-a-ransomware-attack1 page
What can you do if you’ve become the victim of a ransomware attack?
         
3-ways-to-help-stop-data-leakage-in-your-organisation1 page
3 Ways to Help Stop Data Leakage in Your Organisation
         
5-policies-that-can-help-keep-your-active-directory-secure1 page
5 policies that can help keep your Active Directory secure
         
securing-domain-controllers-by-auditing-active-directory1 page
Securing Domain Controllers by Auditing Active Directory
         
healthcare-breaches-is-there-light-at-the-end-of-the-tunnel1 page
Healthcare Breaches – Is there light at the end of the tunnel?
         
8-different-methods-to-identify-privileged-users1 page
8 Different Methods to Identify Privileged Users
         
is-pro-activity-the-best-way-to-deal-with-insider-threats1 page
Is pro-activity the best way to deal with insider threats?
         
the-number-of-data-breaches-are-increasing-at-record-pace1 page
The Number of Data Breaches are Increasing at “Record Pace”, According to New Report
         
a-lesson-in-password-policy-and-it-security-from-peep-show1 page
A Lesson in Password Policy and IT Security from Peep Show
         
10-steps-must-take-to-secure-active-directory1 page
10 Critical Steps All Companies Must Take to Secure Active Directory
         
4-ways-the-sweden-data-leak-could-have-been-avoided1 page
4 Ways the Sweden Data Leak Could Have Been Avoided
         
do-you-still-need-a-siem1 page
Do you still need a SIEM?
         
every-member-of-staff-has-a-role-to-play-in-protecting-company-data1 page
Every member of staff has a role to play in protecting company data
         
auditing-and-monitoring-of-active-directory-whats-the-difference1 page
Auditing and monitoring of Active Directory – what’s the difference?
         
how-to-detect-if-a-user-has-excessive-permissions-on-shared-folders1 page
How to detect if a user has excessive permissions on shared folders
         
common-mistakes-employees-make-that-lead-to-data-leakage1 page
Common Mistakes Employees Make That Lead to Data Leakage
         
reacting-to-the-petya-ransomware-attack-what-can-you-do1 page
Reacting to the ‘Petya’ Ransomware Attack: What Can You Do?
         
our-checklist-for-preventing-data-breaches1 page
Our Checklist for Preventing Data Breaches
         
reporting-on-historical-events-in-active-directory1 page
Reporting on historical events in Active Directory made easy
         
top-10-ways-to-stop-insider-threats1 page
Top 10 ways to stop insider threats
         
file-server-auditing-made-easy1 page
File Server auditing made easy
         
survey-finds-many-organizations-are-at-risk-from-insider-threats1 page
Survey finds many organizations are at risk from insider threats
         
how-to-perform-non-owner-mailbox-access-auditing-in-exchange-20161 page
How to audit non-owner mailbox access in Exchange 2016
         
18-things-it-auditors-need-to-know1 page
18 Things IT Auditors Need to Know
         
270000-customers-may-be-affected-by-wonga-data-breach1 page
270,000 customers may be affected by Wonga data breach
         
it-auditing-and-configuration-drift1 page
IT Auditing and Configuration Drift
         
nine-tips-on-preparing-for-and-passing-your-next-it-audit1 page
Nine Tips on Preparing For and Passing Your Next IT Audit
         
lepideauditor-suite-review-by-tom-lowson1 page
LepideAuditor Suite Review By Tom Lowson
         
three-reasons-why-change-control-is-important1 page
3 Reasons Why Change Control Is Important
         
protect-active-directory-against-security-configuration-drift1 page
Protecting Your Active Directory Against Security Configuration Drift
         
file-server-auditing-as-a-tool-for-ensuring-compliance1 page
File Server Auditing as a Tool for Ensuring Compliance
         
best-practices-for-active-directory-audit-logging1 page
Best Practices for Active Directory Audit Logging
         
protect-privileged-credentials-using-windows-server-2016-pam1 page
Protecting Privileged Credentials Using Windows Server 2016 PAM
         
pci-compliance-for-active-directory-administrators1 page
PCI Compliance for Active Directory Administrators
         
improve-file-server-security-using-abe1 page
Improve File Server Security Using Access-Based Enumeration (ABE)
         
cia-triad-the-basic-principals-of-data-security1 page
CIA triad – The Basic Principals of Data Security
         
do-you-really-need-a-dpo1 page
Do you really need a DPO?
         
heres-what-you-need-to-know-about-gdpr-including-how-it-will-be-affected-by-brexit1 page
Here’s what you need to know about GDPR – including how it will be affected by Brexit
         
the-state-of-it-auditing-today1 page
The state of IT auditing today
         
it-security-roundup-july-august-20161 page
IT Security Roundup – July/August 2016
         
track-of-file-folder-access-modification-and-location1 page
How to keep track of file/folder access, modification and location
         
auditing-things-all-it-departments-need-to-know1 page
Things all IT departments need to know about IT auditing
         
hipaa-compliance-how-to-avoid-getting-caught-out1 page
HIPAA Compliance – how to avoid getting caught out
         
how-to-perform-current-permission-analysis-with-file-server-auditor1 page
How to perform current permission analysis with File Server Auditor
         
what-to-look-for-when-choosing-the-right-active-directory-auditing-solution1 page
What to look for when choosing the right Active Directory auditing solution
         
insider-security-threats-common-mistakes-organizations-make-and-how-to-avoid-them1 page
Insider security threats: common mistakes organizations make and how to avoid them
         
what-we-learnt-at-infosec-20161 page
What we learnt at InfoSec 2016
         
security-and-the-need-for-user-account-auditing1 page
Security and the need for user account auditing
         
who-what-when-and-where-auditing-your-it-systems1 page
Who, What, When, and Where – the things you need to know when auditing your IT environment
         
top-10-audit-reports-for-it-teams1 page
Top 10 Audit Reports for IT Teams
         
identify-server-files-have-been-deleted1 page
Best practice for auditing and monitoring file/folder level activity
         
why-dont-gartner-do-a-quadrant-for-it-auditing1 page
Why don’t Gartner do a quadrant for IT auditing?
         
guarantee-a-merry-christmas-with-lepideauditor-suite1 page
Guarantee a merry Christmas with LepideAuditor Suite
         
9-critical-flaws-in-auditing-active-directory-natively1 page
9 critical flaws in auditing Active Directory natively
         
to-audit-or-not-to-audit-that-is-the-question1 page
To audit or not to audit… that is the question
         
nine-simple-tips-to-secure-the-active-directory1 page
Nine simple tips to secure the Active Directory
         
how-ad-inactive-accounts-harm-security1 page
Do inactive accounts harm the Active Directory network security?
         
does-forcing-users-to-change-passwords-more-frequently-really-amount-to-increased-security1 page
Does forcing users to change passwords more frequently really amount to increased security?
         
active-directory-security-tips1 page
Real world practical tips to make Active Directory security a sure thing
         
securing-domain-controllers-to-protect-active-directory-why-and-how1 page
Securing Domain Controllers to Protect Active Directory – Why and How?
         
how-to-come-up-with-a-better-password-management-system1 page
How to come up with a Better Password Management System
         
how-to-securely-use-a-self-service-password-reset-solution1 page
Best Practice: How to Securely Use a Self-Service Password Reset Solution
         
is-windows-azure-active-directory-for-you1 page
Is Windows Azure Active Directory for You?
         
how-to-tackle-malicious-password-attacks1 page
How to tackle malicious password attacks and reduce costs involved in servicing legitimate account lockouts
         
new-compliance-regulations-and-their-implications-on-your-business1 page
New Compliance Regulations and their Implications on Your Business
         
protecting-credit-card-data-should-be-a-top-priority1 page
Protecting Credit Card Data Should be a Top Priority
         
why-you-need-centralized-event-log-management1 page
Why you need centralized event log management
         
how-event-log-monitoring-programs-work1 page
How Event Log monitoring programs work
         
effectively-manage-network-wide-event-collection-and-auto-correlation1 page
Effectively manage Network wide event collection and auto-correlation
         
remove-log-size-restrictions-with-lelm1 page
Remove log size restrictions with LELM
         
event-log-management-script-tools-vs-standalone-utilities1 page
Event log management script tools Vs standalone utilities
         
event-log-monitoring1 page
Event Log Monitoring
         
syslog-based-centralized-log-management-with-event-log-manager1 page
Syslog based centralized log management with event log manager
         
how-securing-data-access-across-windows-servers-help-organizations-to-better-manage-their-shared-data1 page
How securing data access across Windows Servers help organizations to better manage their shared data
         
dynamic-access-control-for-file-server-21 page
Dynamic Access Control for File Server – Part 2
         
audit-file-access-and-share-with-lepideauditor-for-file-server1 page
Auditing File Access and File Share using LepideAuditor for File Server
         
dynamic-access-control-for-file-server-11 page
Dynamic Access Control for File Server – Part 1
         
can-third-party-windows-server-auditors-work-on-android-platform1 page
Can Third Party Windows Server Auditors Work on Android Platform?
         
prerequisites-for-hassle-free-file-server-auditing1 page
Prerequisites for hassle-free File Server Auditing
         
lepide-software-launches-lepideauditor-for-file-server1 page
Lepide Software Launches LepideAuditor for File Server
         
are-it-and-efficiency-mutually-exclusive1 page
Are IT and Efficiency Mutually Exclusive?
         
internet-of-things-part-21 page
Moving towards a Smarter Internet: Internet of Things Part II (Present, Challenges & Opportunities)
         
upgrade-windows-server-2003-to-latest-one1 page
Countdown Begins! It’s High Time to Upgrade Windows Server 2003 to Latest One
         
internet-of-things-part-11 page
Moving towards a Smarter Internet: Internet of Things Part I (Present, Challenges, Threats & Opportunities)
         
analyzing-organizational-cyberspace-security-sony-hack1 page
Analyzing Organizational Cyberspace Security in the Awakening of Sony Hack
         
forecasting-technology-trends-20151 page
Forecasting Technology Trends 2015: Stand up and Take Notice!
         
why-third-party-tools-to-manage-server-and-networking-infrastructure1 page
Why Select Third-Party Tools to Manage Server and Networking Infrastructures?
         
why-techies-need-to-slow-down-for-better-health1 page
Why Techies Need To Slow Down For Better Health
         
10-statements-to-ruin-your-day1 page
10 statements to ruin your day
         
death-of-a-salesman1 page
Death of a salesman
         
like-us-vote-for-our-products1 page
Like us. Vote for our products
         
last-logon-reporter-tool1 page
Last logon Reporter Tool
         
the-panama-papers-what-we-know-so-far1 page
The Panama Papers – What we know so far
         
can-ex-employees-sabotage-your-it-assets-at-their-will1 page
Can ex-employees sabotage your IT assets at their will?
         
security-vs-trust1 page
Security vs. Trust – It’s all about Behavior
         
ashley-madison-data-leak-what-are-the-lessons1 page
Ashley Madison data leak – What are the lessons?
         
minimalize-the-risk-and-protect-yourself-from-thwarting-cyber-attacks1 page
Minimalize the risk and protect yourself from thwarting cyber-attacks
         
ten-it-admin-mistakes-that-can-be-expensive-on-security-and-productivity-fronts1 page
Ten IT admin mistakes that can be expensive on security and productivity fronts
         
administration-duties-for-improved-security-and-change-control1 page
3 Ways to Separate Administration Duties for Improved Security and Change Control
         
failure-to-secure-end-user-devices-leaves-servers-and-data-at-risk1 page
Failure to Secure End-User Devices Leaves Servers and Data at Risk
         
bring-sql-server-management-studio-on-mobile1 page
A Thought to Bring the SQL Server Management Studio on Mobile
         
are-you-using-sql-server-management-studio-effectively1 page
Are You Using SQL Server Management Studio effectively?
         
manage-stored-sql-mdf-files-and-improve-sql-server-performance1 page
Manage stored SQL MDF files and improve SQL server performance
         
enhance-sql-database-performance-with-sql-storage-manager1 page
Enhance SQL database performance with SQL storage manager
         
tips-for-surviving-an-it-audit1 page
Tips for Surviving an IT Audit
         
auditing-account-management-and-directory-service-access1 page
Auditing Account Management and Directory Service Access in Windows Server 2012
         
stay-safe-of-security-risks-this-holiday-season1 page
Stay safe of security risks this holiday season
         
ad-user-management-with-powershell1 page
Active Directory User Management using Windows PowerShell
         
troubleshoot-ad-account-lockouts1 page
How to Troubleshoot Active Directory Account Lockouts and Manage Employee Productivity
         
common-mistakes-by-admins-in-log-analysis1 page
Common mistakes made by Admins during log analysis
         
overcoming-the-limitations-of-native-ad-auditing-with-laad1 page
Overcoming the limitations of Native Auditing with LepideAuditor for Active Directory
         
manage-password-expiration-in-active-directory1 page
An effective way to manage password expiration in Active Directory
         
audit-sql-server-for-advanced-server-performance1 page
Audit SQL Server for restraining data threats and experience advanced server performance
         
factors-to-be-considered-while-performing-an-active-directory-security-audit1 page
Factors to be considered while performing an active directory security audit
         
use-active-directory-self-service-to-meet-ad-challenges1 page
Use Active Directory self service to meet AD challenges
         
ad-management-complexities-and-need-of-self-service-facility1 page
AD management complexities and need of self service facility
         
get-over-identity-management-obstacles-with-ad-self-service1 page
Get over Identity Management obstacles with AD Self Service
         
how-adss-is-important-to-increase-organizations-productivity1 page
How ADSS is important to increase organizations productivity
         
automatic-directory-update-with-self-service1 page
Automatic directory update with self service
         
active-directory-user-rights-management1 page
Active Directory User rights management
         
enable-ad-recycle-bin1 page
Enable AD Recycle Bin
         
self-service-applications-for-active-directory1 page
Self service applications for Active Directory
         
end-user-self-service-through-scsm-portal-but-is-it-enough1 page
End user self service through SCSM portal- But is it enough?
         
how-do-siem-solutions-help-mitigate-advanced-persistent-threats-apt1 page
How do SIEM Solutions Help Mitigate Advanced Persistent Threats (APT)?
         
the-future-of-data-protection-in-the-uk1 page
The Future of Data Protection in the UK
         
prevent-petya-and-other-ransomware-attacks-by-disabling-smbv11 page
Prevent Petya and other Ransomware attacks by disabling SMBv1
         
remove-users-admin-rights-to-prevent-insider-hacks1 page
Remove Admin Rights from Users to Prevent Insider Hacks
         
businesses-are-failing-to-report-their-most-disruptive-data-breaches1 page
Businesses are Failing to Report Their Most Disruptive Data Breaches
         
3-things-the-deloitte-breach-can-teach-you-about-mastering-it-security1 page
3 Things the Deloitte Breach Can Teach You About Mastering IT Security
         
is-gdpr-enforceable-in-practice-outside-of-the-eu1 page
Is GDPR Enforceable in Practice Outside of the EU?
         
insider-threats-5-ways-protect-and-secure-sensitive-data1 page
Insider Threats: 5 Ways your Company Can Protect and Secure Sensitive Data
         
the-importance-of-data-classification1 page
The Importance of Data Classification
         
why-choose-lepideauditor-over-native-auditing-for-it-security-and-compliance1 page
Improving IT Security and Compliance: LepideAuditor vs Native Auditing
         
why-automated-response-is-critical-to-it-security1 page
Why Automated Response is Critical to IT Security and how Lepide helps
         
top-10-risks-to-active-directory-security1 page
Top 10 Risks to Active Directory Security
         
gearing-up-to-fight-ransomware-attacks1 page
Gearing up to Fight Ransomware Attacks
         
how-lepideauditor-overcomes-the-limitations-of-auditing-office-365-natively1 page
How LepideAuditor Overcomes the Limitations of Auditing Office 365 Natively
         
overcoming-common-visibility-issues-with-exchange-server-auditing1 page
Overcoming Common Visibility Issues with Exchange Server Auditing
         
cyber-security-awareness-checklist-for-financial-institutions1 page
Cyber Security Awareness Checklist for Financial Institutions
         
what-steps-can-law-firms-take-to-protect-their-confidential-data1 page
What Steps can Law Firms take to Protect their Confidential Data?
         
uber-uncool-do-we-really-know-how-many-data-breaches-there-are1 page
Uber-Uncool: Do We Really Know How Many Data Breaches There Are?
         
privileged-users-growing-threat-to-your-it-security1 page
A Growing Threat to your IT Security: Privileged Users
         
how-to-use-active-directory-services-to-meet-security-and-compliance-requirements1 page
How to use Active Directory Services to Meet Security and Compliance Requirements
         
improving-security-and-compliance-ten-common-active-directory-mistakes1 page
Improving Security and Compliance: 10 Common Active Directory Mistakes
         
how-lepideauditor-helps-increase-security-in-the-education-sector1 page
How LepideAuditor Helps Increase Security in the Education Sector
         
how-the-security-reports-in-lepideauditor-help-you-protect-sensitive-data1 page
How the Security Reports in LepideAuditor Help You Protect Sensitive Data
         
how-will-the-gdpr-affect-companies-in-the-usa1 page
How will the GDPR Affect Companies in the USA
         
ten-ways-to-improve-data-security1 page
10 Ways to Improve Data Security
         
eight-technologies-financial-institutions-should-be-aware-of1 page
8 Technologies Financial Institutions Should Be Aware Of
         
insider-threats-in-healthcare-280000-medicaid-patient-records-hacked1 page
Insider Threats in Healthcare: 280,000 Medicaid Patient Records Hacked
         
ten-predictions-for-it-security-in-20181 page
10 Predictions for IT Security in 2018
         
how-can-financial-institutions-prevent-and-recover-from-a-data-breach1 page
How can Financial Institutions Prevent and Recover from a Data Breach
         
how-can-educational-institutions-respond-to-the-growing-threat-of-a-cyber-attack1 page
How can Educational Institutions Respond to the Growing Threat of a Cyber-Attack?
         
the-10-biggest-data-security-problems-in-the-healthcare-industry1 page
The 10 Biggest Data Security Problems in the Healthcare Industry
         
pci-3-2-best-practices-will-soon-be-mandatory-prepare-yourself-for-february-1st-20181 page
PCI 3.2 Best Practices Will Soon Be Mandatory: Prepare yourself for February 1st 2018
         
how-would-your-organization-fare-if-faced-with-this-data-security-issue1 page
How Would Your Organization Fare if Faced with This Data Security Issue?
         
have-you-left-it-unlocked-with-the-keys-in1 page
Have You Left It Unlocked with The Keys In?
         
improve-file-server-security-by-delegating-outside-of-the-it-department1 page
Improve File Server Security by Delegating Outside of the IT Department
         
4-steps-to-securing-unstructured-data-for-compliance1 page
4 Steps to Securing Unstructured Data for Compliance
         
sears-and-delta-breaches-reinforce-need-for-pci-dss-compliance1 page
Sears and Delta Breaches Reinforce Need for PCI DSS Compliance
         
data-protection-officers-and-gdpr-what-you-need-to-know1 page
Data Protection Officers and GDPR: What You Need to Know
         
what-gdpr-really-means-for-banks-and-finance-houses1 page
What GDPR Really Means for Banks and Finance Houses
         
how-automated-compliance-reports-can-help-mitigate-risk-of-non-compliance1 page
How Automated Compliance Reports Can Help Mitigate Risk of Non-Compliance
         
the-ico-prepare-to-run-gdpr-campaign-aimed-at-consumers1 page
The ICO Prepare to Run GDPR Campaign Aimed at Consumers
         
the-importance-of-a-capable-compliance-manager1 page
The Importance of a Capable Compliance Manager
         
how-to-stay-compliant-with-pci-3-2-a-checklist1 page
How to Stay Compliant with PCI 3.2: A Checklist
         
the-threat-of-unstructured-data1 page
The Threat of Unstructured Data
         
why-you-need-to-audit-privileged-accounts-in-active-directory1 page
Why you Need to Audit Privileged Accounts in Active Directory
         
most-companies-think-their-active-directory-is-secure-until-they-talk-to-us1 page
Most Companies Think Their Active Directory is Secure Until They Talk to Us
         
poor-visibility-and-weak-passwords-are-putting-active-directory-at-risk1 page
Poor Visibility and Weak Passwords are Putting Active Directory at Risk
         
how-auditing-access-rights-and-changes-strengthen-security1 page
How Auditing Access Rights, States and Changes Helps Strengthen Security
         
how-to-ensure-your-active-directory-is-secure1 page
How to Ensure Your Active Directory is Secure
         
do-you-need-an-active-directory-auditing-tool1 page
Do You Need An Active Directory Auditing Tool?
         
how-to-manage-privileged-users-for-better-security-and-compliance1 page
How to Manage Privileged Users for Better Security and Compliance
         
how-cisos-are-adapting-to-meet-the-rising-threat-of-a-cyber-attack1 page
How CISOs are Adapting to Meet the Rising Threat of a Cyber-Attack
         
how-to-prevent-data-breaches-in-the-healthcare-sector1 page
How to Prevent Data Breaches in the Healthcare Sector
         
why-auditing-permissions-is-an-essential-part-of-your-it-security-plan1 page
Why Auditing Permissions is an Essential Part of Your IT Security Plan
         
the-problem-of-privilege-management-in-data-security1 page
The Problem of Privilege Management in Data Security
         
when-is-a-data-breach-really-considered-a-data-breach-in-the-usa1 page
When is a Data Breach Really Considered a Data Breach in the USA?
         
governments-now-using-have-i-been-pwned-to-check-data-breach-status1 page
Governments Now Using “Have I Been Pwned” to Check Data Breach Status
         
what-we-can-learn-from-the-atlanta-ransomware-attack1 page
What We Can Learn from the Atlanta Ransomware Attack
         
ransomware-attacks-in-the-healthcare-sector1 page
Ransomware Attacks in the Healthcare Sector
         
how-lepideauditor-helps-meet-hipaa-compliance1 page
How LepideAuditor Helps Meet HIPAA Compliance
         
four-things-you-should-know-about-it-risk-assessments1 page
4 Things You Should Know About IT Risk Assessments
         
gdpr-warning-ico-issues-record-fines-in-january1 page
GDPR Warning: ICO Issues Record Fines in January
         
how-to-be-compliant-in-20181 page
How to Be Compliant in 2018
         
why-it-security-is-inside-out1 page
Why IT Security Is Inside Out
         
the-myth-of-ransomware-prevention-solutions1 page
The Myth of Ransomware Prevention Solutions
         
using-change-auditing-for-an-effective-incident-response-plan1 page
Using Change Auditing for an Effective Incident Response Plan
         
have-you-forgotten-about-your-sox-compliance-audit1 page
Have you Forgotten About your SOX Compliance Audit?
         
gdpr-are-companies-concerned-about-the-consequence-of-non-compliance1 page
GDPR: Are Companies Concerned About the Consequence of Non-Compliance?
         
local-authorities-need-to-start-preparing-for-the-gdpr1 page
Local Authorities Need to Start Preparing for the GDPR
         
gdpr-likely-to-hit-mid-market-organizations-the-hardest1 page
GDPR Likely to Hit Mid-Market Organizations the Hardest
         
reporting-a-breach-under-the-gdpr1 page
Reporting a Breach Under the GDPR
         
tesla-security-breach-highlights-lack-of-insider-monitoring1 page
Tesla Security Breach Highlights Lack of Insider Monitoring
         
security-policies-cisos-must-implement1 page
Security Policies CISOs Must Implement
         
password-policy-best-practices-our-suggestions1 page
Password Policy Best Practices – Our Suggestions
         
what-cisos-can-learn-from-the-yahoo-data-breach-fine1 page
What CISOs Can Learn from the Yahoo Data Breach Fine
         
insider-threats-preparation-best-practices-and-detection1 page
Insider Threats: Preparation, Best Practices and Detection
         
the-danger-of-delayed-threat-detection-and-how-to-prevent-it1 page
The Danger of Delayed Threat Detection and How to Prevent it
         
5-steps-for-developing-a-successful-data-access-governance-dag-program1 page
5 Steps for Developing a Successful Data Access Governance (DAG) Program
         
data-classification-the-whys-and-the-hows1 page
Data Classification: The Why’s and the How’s
         
a-year-after-wannacry-what-lessons-have-been-learned1 page
A Year After WannaCry, What Lessons Have Been Learned?
         
5-ways-ransomware-is-changing-in-20181 page
5 Ways Ransomware is Changing in 2018
         
how-will-a-cyber-attack-impact-your-business1 page
How Will A Cyber-Attack Impact Your Business?
         
how-can-we-prevent-employees-violating-security-policies1 page
How Can We Prevent Employees Violating Security Policies?
         
how-to-keep-ephi-out-of-the-wrong-hands-whilst-ensuring-availability1 page
How to Keep ePHI Out of the Wrong Hands, Whilst Ensuring Availability
         
how-does-privilege-separation-improve-it-security1 page
How Does Privilege Separation Improve IT Security?
         
aggregating-auditing-data-from-multiple-cloud-services-using-a-dcap-solution1 page
Aggregating & Auditing Data from Multiple Cloud Services Using a DCAP Solution
         
why-auditing-office-365-natively-isnt-enough1 page
Why Auditing Office 365 Natively Isn’t Enough
         
how-lepideauditor-can-help-to-protect-active-directory1 page
How LepideAuditor Can Help to Protect Active Directory
         
how-enterprises-are-making-use-of-user-entity-behavior-analytics-ueba1 page
How Enterprises are Making Use of User & Entity Behavior Analytics (UEBA)
         
why-now-is-the-time-for-a-data-centric-security-strategy1 page
Why Now is the Time for a Data-Centric Security Strategy
         
what-is-data-centric-audit-and-protection-dcap1 page
What is Data-Centric Audit and Protection (DCAP)?
         
do-disabled-and-deleted-accounts-in-sharepoint-create-a-security-risk1 page
Do Disabled and Deleted Accounts in SharePoint Create a Security Risk?
         
why-active-directory-is-the-main-target-of-insider-cyber-attacks1 page
Why Active Directory is the Main Target of Insider Cyber-Attacks
         
how-office-365-audit-logging-can-improve-your-security1 page
How Office 365 Audit Logging Can Improve Your Security
         
should-you-be-concerned-about-gdpr-fines1 page
Should You be Concerned About GDPR Fines?
         
naughty-microsoft-are-gdpr-fines-incoming1 page
Naughty Microsoft: Are GDPR Fines Incoming?
         
is-gdpr-working-to-increase-data-security1 page
Is GDPR Working to Increase Data Security?
         
is-your-data-access-governance-program-fit-for-gdpr-compliance1 page
Is Your Data Access Governance Program Fit for GDPR Compliance?
         
the-top-10-data-breaches-of-20181 page
The Top 10 Data Breaches of 2018
         
the-difference-between-information-security-and-cybersecurity1 page
The Difference Between Information Security and Cybersecurity
         
how-data-access-governance-compliments-privileged-access-management1 page
How Data Access Governance Compliments Privileged Access Management
         
5-questions-you-need-to-answer-to-protect-yourself-from-rogue-admins1 page
5 Questions You Need to Answer to Protect Yourself from Rogue Admins
         
tips-to-protect-office-365-data-against-ransomware1 page
Tips to Protect Office 365 Data Against Ransomware
         
prevent-detect-and-recover-from-a-ransomware-attack1 page
Prevent, Detect and Recover from a Ransomware Attack
         
ransomware-vs-cryptojacking1 page
Ransomware VS Cryptojacking
         
cyber-security-best-practices-employee-training-techniques-that-stick1 page
Cyber-Security Best Practices: Employee Training Techniques That Stick
         
is-it-possible-to-prevent-data-breaches-caused-by-insiders1 page
Is it Possible to Prevent Data Breaches Caused by Insiders?
         
3-reasons-why-cybersecurity-in-non-profit-organizations-is-so-important1 page
3 Reasons Why Cybersecurity in Non-profit Organizations is so Important
         
how-dcap-solutions-protect-your-company-from-insider-threats1 page
How DCAP Solutions Protect Your Company from Insider Threats
         
4-security-automation-tips-for-your-business1 page
4 Security Automation Tips for Your Business
         
3-ways-data-discovery-and-classification-improves-data-security1 page
3 Ways Data Discovery and Classification Improves Data Security
         
it-security-trends-of-20181 page
IT Security Trends Of 2018
         
why-cybersecurity-security-isnt-just-an-it-problem1 page
Why Cybersecurity Security Isn’t Just an IT Problem
         
what-should-your-it-risk-assessment-focus-on1 page
What Should Your IT Risk Assessment Focus On?
         
college-campuses-are-a-breeding-ground-for-insider-threats1 page
College Campuses are a Breeding Ground for Insider Threats
         
preventing-cyber-attacks-during-the-midterm-elections1 page
Preventing Cyber-Attacks During the Midterm Elections
         
why-dont-we-secure-our-data-in-the-same-way-that-we-secure-our-money1 page
Why Don’t We Secure Our Data in the Same Way That We Secure Our Money?
         
what-healthcare-organizations-have-to-say-about-information-security1 page
What Healthcare Organizations Have to Say About Information Security
         
how-not-to-handle-a-data-breach-with-examples1 page
How NOT to Handle a Data Breach (With Examples)
         
automation-is-the-key-to-effective-cybersecurity1 page
Automation is the Key to Effective Cybersecurity
         
shortage-of-security-personnel-is-a-major-cause-of-data-breaches1 page
Shortage of Security Personnel is a Major Cause of Data Breaches
         
the-pressure-on-cisos-is-ramping-up1 page
The Pressure on CISOs is Ramping Up
         
what-is-shaping-the-bleak-healthcare-cyber-security-landscape1 page
What Is Shaping the Bleak Healthcare Cyber-Security Landscape?
         
can-a-private-blockchain-be-used-to-secure-sensitive-data1 page
Can a Private Blockchain Be Used to Secure Sensitive Data?
         
national-cyber-security-awareness-month-2018-key-talking-points1 page
National Cyber Security Awareness Month 2018: Key Talking Points
         
the-5-foundations-of-data-security1 page
The 5 Foundations of Data Security
         
the-state-of-education-cyber-security-in-20181 page
The State of Education Cyber-Security in 2018
         
the-state-of-finance-cybersecurity-in-20181 page
The State of Finance Cybersecurity In 2018
         
the-state-of-healthcare-cyber-security-in-20181 page
The State of Healthcare Cyber Security in 2018
         
why-privileged-accounts-are-a-gateway-to-cyber-attacks1 page
Why Privileged Accounts Are A Gateway to Cyber Attacks
         
what-is-the-zero-trust-model-of-security-and-why-is-it-important1 page
What is the Zero Trust Model of Security and Why is it Important?
         
external-attacks-vs-insider-threats-where-should-your-security-budget-go1 page
External Attacks VS Insider Threats: Where Should Your Security Budget Go?
         
why-investing-millions-in-cyber-security-is-not-enough1 page
Why Investing Millions in Cyber-security is Not Enough
         
inadequate-logging-and-monitoring-a-big-concern-for-enterprise-cybersecurity1 page
Inadequate Logging and Monitoring a Big Concern for Enterprise Cybersecurity
         
enterprise-insider-threats-and-the-observer-effect1 page
Enterprise Insider Threats and the Observer Effect
         
information-security-risk-management-how-to-get-it-right1 page
Information Security Risk Management: How to Get it Right
         
why-are-companies-failing-at-incident-response1 page
Why Are Companies Failing at Incident Response?
         
best-practices-for-securing-your-employee-data1 page
Best Practices for Securing Your Employee Data
         
5-ways-to-secure-electronic-health-records1 page
5 Ways to Secure Electronic Health Records
         
why-education-institutions-need-to-pay-attention-to-insider-threats1 page
Why Education Institutions Need to Pay Attention to Insider Threats
         
reddit-is-sms-based-authentication-really-secure1 page
Reddit: Is SMS-Based Authentication Really Secure?
         
most-healthcare-organizations-cant-recover-from-data-breaches1 page
Most Healthcare Organizations Can’t Recover from Data Breaches
         
5-methods-for-better-insider-threat-prevention1 page
5 Methods for Better Insider Threat Prevention
         
5-common-myths-about-insider-threats1 page
5 Common Myths About Insider Threats
    
whitepaper35 pages
Popular Cyber Attack Methods and How to Mitigate Them
Lepide Whitepapers: Cyber-Security, Ransomware and IT Auditing
10 Best Practices for Keeping Active Directory Secure
How to Secure and Protect Personally Identifiable Information (PII)
Do You Need A Data-Centric Audit & Protection Solution?
Is Your Organization Prepared for a Cyber-Attack?
How to Discovery and Classify Data Using FSRM – Whitepaper
Cyber Attacks: A Suggested Approach – Whitepaper – Lepide
Ransomware Predictions for 2018 - Whitepaper
Security Monitoring: The Missing Link – Whitepaper
How to Deal with the Threat of Malicious “Cyber” Insiders - Lepide Whitepaper
Top 10 Ways to Avoid Privilege Abuse – Whitepaper
ransomware-detection-and-prevention-with-las.pdf
Should the NHS Outsource Information Governance – Whitepaper
reanimating-the-deleted-objects-of-active-directory.pdf
Avoiding privilege abuse in Active Directory
Insider Threats: Trust Isn’t a Security Strategy
Improving IT Efficiency: Getting the Right Tool for the Job
10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance
How Auditing Helps Meet PCI DSS Compliance - Whitepaper
How Educational Institutions Should Prepare for GDPR Compliance
The NHS, the GDPR and the importance of automated solutions
SIEM-less Auditing - A Seamless Auditing Solution in Microsoft Windows – Whitepaper
Best Practices for Keeping Active Directory Clean – Whitepaper
Basic Principles for Securing Active Directory – Whitepaper
Auditing, Logging and Alerting - Lepide Whitepaper
The Lepide Guide to SIEM (Security Information & Event Management)
Detecting Ransomware using File Server Auditing – Whitepaper
taking-active-directory-auditing-to-the-next-level.pdf
how-to-install-exchange-2016.pdf
9 Critical Flaws in Auditing Active Directory Natively
Is Native Auditing Really a Choice?
successful-file-server-auditing-looking-beyond-native-auditing.pdf
achieving-pci-compliance-with-2020-auditsuite.pdf
whitepaper-lafs.pdf
    
news2 pages
Latest News and Updates – Lepide Software
xmlrpc.php?rsd
         
track-users-and-objects-with-excessive-permissions-with-lepideauditor-18-71 page
Easily Identify Users and Objects with Excessive Permissions with LepideAuditor 18.7
         
wp-includes1 page
wlwmanifest.xml
         
category
              
product-update1 page
Product Update - Latest News and Updates – Lepide Software
                   
page
                        
21 page
Product Update - Latest News and Updates – Lepide Software - Page 2
                        
31 page
Product Update - Latest News and Updates – Lepide Software - Page 3
                        
41 page
Product Update - Latest News and Updates – Lepide Software - Page 4
                        
51 page
Product Update - Latest News and Updates – Lepide Software - Page 5
                        
71 page
Product Update - Latest News and Updates – Lepide Software - Page 7
                        
61 page
Product Update - Latest News and Updates – Lepide Software - Page 6
                        
81 page
Product Update - Latest News and Updates – Lepide Software - Page 8
                        
91 page
Product Update - Latest News and Updates – Lepide Software - Page 9
              
announcement1 page
Announcement - Latest News and Updates – Lepide Software
                   
page
                        
21 page
Announcement - Latest News and Updates – Lepide Software - Page 2
              
new-launch1 page
New Launch - Latest News and Updates – Lepide Software
                   
page
                        
21 page
New Launch - Latest News and Updates – Lepide Software - Page 2
         
lepideauditor-now-includes-data-discovery-and-classification1 page
LepideAuditor Now Includes Data Discovery and Classification
         
20181 page
2018 - Latest News and Updates – Lepide Software
              
121 page
2018 December - Latest News and Updates – Lepide Software
              
111 page
2018 November - Latest News and Updates – Lepide Software
              
101 page
2018 October - Latest News and Updates – Lepide Software
              
091 page
2018 September - Latest News and Updates – Lepide Software
              
081 page
2018 August - Latest News and Updates – Lepide Software
              
071 page
2018 July - Latest News and Updates – Lepide Software
              
051 page
2018 May - Latest News and Updates – Lepide Software
              
041 page
2018 April - Latest News and Updates – Lepide Software
              
011 page
2018 January - Latest News and Updates – Lepide Software
         
20171 page
2017 - Latest News and Updates – Lepide Software
              
111 page
2017 November - Latest News and Updates – Lepide Software
              
101 page
2017 October - Latest News and Updates – Lepide Software
              
081 page
2017 August - Latest News and Updates – Lepide Software
              
061 page
2017 June - Latest News and Updates – Lepide Software
              
051 page
2017 May - Latest News and Updates – Lepide Software
              
031 page
2017 March - Latest News and Updates – Lepide Software
              
021 page
2017 February - Latest News and Updates – Lepide Software
              
011 page
2017 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2017 - Latest News and Updates – Lepide Software - Page 2
         
20161 page
2016 - Latest News and Updates – Lepide Software
              
101 page
2016 October - Latest News and Updates – Lepide Software
              
091 page
2016 September - Latest News and Updates – Lepide Software
              
081 page
2016 August - Latest News and Updates – Lepide Software
              
071 page
2016 July - Latest News and Updates – Lepide Software
              
061 page
2016 June - Latest News and Updates – Lepide Software
              
041 page
2016 April - Latest News and Updates – Lepide Software
              
031 page
2016 March - Latest News and Updates – Lepide Software
              
021 page
2016 February - Latest News and Updates – Lepide Software
              
011 page
2016 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2016 - Latest News and Updates – Lepide Software - Page 2
         
20151 page
2015 - Latest News and Updates – Lepide Software
              
121 page
2015 December - Latest News and Updates – Lepide Software
              
111 page
2015 November - Latest News and Updates – Lepide Software
              
101 page
2015 October - Latest News and Updates – Lepide Software
              
091 page
2015 September - Latest News and Updates – Lepide Software
              
081 page
2015 August - Latest News and Updates – Lepide Software
              
071 page
2015 July - Latest News and Updates – Lepide Software
              
061 page
2015 June - Latest News and Updates – Lepide Software
              
051 page
2015 May - Latest News and Updates – Lepide Software
              
041 page
2015 April - Latest News and Updates – Lepide Software
              
031 page
2015 March - Latest News and Updates – Lepide Software
              
021 page
2015 February - Latest News and Updates – Lepide Software
              
011 page
2015 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2015 - Latest News and Updates – Lepide Software - Page 2
                   
31 page
2015 - Latest News and Updates – Lepide Software - Page 3
         
20141 page
2014 - Latest News and Updates – Lepide Software
              
121 page
2014 December - Latest News and Updates – Lepide Software
              
111 page
2014 November - Latest News and Updates – Lepide Software
              
101 page
2014 October - Latest News and Updates – Lepide Software
              
081 page
2014 August - Latest News and Updates – Lepide Software
              
061 page
2014 June - Latest News and Updates – Lepide Software
              
051 page
2014 May - Latest News and Updates – Lepide Software
              
021 page
2014 February - Latest News and Updates – Lepide Software
              
011 page
2014 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2014 - Latest News and Updates – Lepide Software - Page 2
         
20131 page
2013 - Latest News and Updates – Lepide Software
              
091 page
2013 September - Latest News and Updates – Lepide Software
              
071 page
2013 July - Latest News and Updates – Lepide Software
              
061 page
2013 June - Latest News and Updates – Lepide Software
              
051 page
2013 May - Latest News and Updates – Lepide Software
              
041 page
2013 April - Latest News and Updates – Lepide Software
              
021 page
2013 February - Latest News and Updates – Lepide Software
              
011 page
2013 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2013 - Latest News and Updates – Lepide Software - Page 2
         
20121 page
2012 - Latest News and Updates – Lepide Software
              
111 page
2012 November - Latest News and Updates – Lepide Software
              
101 page
2012 October - Latest News and Updates – Lepide Software
              
091 page
2012 September - Latest News and Updates – Lepide Software
              
081 page
2012 August - Latest News and Updates – Lepide Software
              
071 page
2012 July - Latest News and Updates – Lepide Software
              
061 page
2012 June - Latest News and Updates – Lepide Software
              
051 page
2012 May - Latest News and Updates – Lepide Software
              
031 page
2012 March - Latest News and Updates – Lepide Software
              
page
                   
21 page
2012 - Latest News and Updates – Lepide Software - Page 2
         
20111 page
2011 - Latest News and Updates – Lepide Software
              
121 page
2011 December - Latest News and Updates – Lepide Software
              
011 page
2011 January - Latest News and Updates – Lepide Software
         
20101 page
2010 - Latest News and Updates – Lepide Software
              
041 page
2010 April - Latest News and Updates – Lepide Software
         
20091 page
2009 - Latest News and Updates – Lepide Software
              
101 page
2009 October - Latest News and Updates – Lepide Software
         
lepideauditor-18-5-introduces-anomaly-spotting-to-improve-user-entity-behavior-analytics1 page
LepideAuditor 18.5 Introduces Anomaly Spotting to Improve User & Entity Behavior Analytics
         
lepideauditor-18-4-released1 page
LepideAuditor 18.4 Introduces a Brand-New Interactive Access Governance Insights Dashboard and G Suite Auditing
         
lepide-active-directory-self-service-version-18-1-released1 page
Lepide Releases Version 18.1 of Active Directory Self Service Solution with New Search Capabilities
         
lepideauditor-18-3-now-integrates-with-any-siem-solution-and-introduces-amazon-web-services-auditing1 page
LepideAuditor 18.3 now integrates with any SIEM Solution and Introduces Amazon Web Services Auditing
         
lepideauditor-18-1-now-audits-cloud-components1 page
LepideAuditor 18.1 Now Audits Dropbox, Azure AD and OneDrive for Business
         
lepideauditor-18-0-now-including-open-share-analysis1 page
Launch of LepideAuditor 18.0 – Now Including Open Share Analysis
         
launch-of-lepideauditor-17-5-4-now-with-integrated-data-discovery-and-classification1 page
Launch of LepideAuditor 17.5.4 – Now with Integrated Data Discovery and Classification
         
lepide-launches-active-directory-self-service-18-01 page
Lepide Launches Active Directory Self Service 18.0: Now with Automated Script Execution
         
page
              
21 page
Latest News and Updates – Lepide Software - Page 2
              
31 page
Latest News and Updates – Lepide Software - Page 3
              
41 page
Latest News and Updates – Lepide Software - Page 4
              
51 page
Latest News and Updates – Lepide Software - Page 5
              
121 page
Latest News and Updates – Lepide Software - Page 12
              
111 page
Latest News and Updates – Lepide Software - Page 11
              
101 page
Latest News and Updates – Lepide Software - Page 10
              
61 page
Latest News and Updates – Lepide Software - Page 6
              
71 page
Latest News and Updates – Lepide Software - Page 7
              
91 page
Latest News and Updates – Lepide Software - Page 9
              
81 page
Latest News and Updates – Lepide Software - Page 8
         
easily-meet-gdpr-compliance-with-lepideauditor-17-51 page
Easily meet GDPR compliance with LepideAuditor 17.5
         
lepidemigrator-for-exchange-moves-to-kernel1 page
LepideMigrator for Exchange moves to Kernel
         
audit-sharepoint-online-with-lepideauditor-17-41 page
Audit SharePoint Online with LepideAuditor 17.4
         
lepideauditor-17-3-with-netapp-cluster-mode-auditing1 page
Launch of LepideAuditor 17.3 – Now with NetApp Cluster Mode auditing
         
launch-of-lepideauditor-17-21 page
Launch of LepideAuditor 17.2
         
lepide-exchange-recovery-manager-moves-to-kernel1 page
Lepide Exchange Recovery Manager moves to Kernel
         
lepide-active-directory-self-service-17-0-is-now-available1 page
Lepide Active Directory Self Service 17.0 is now available
         
lepideauditor-17-1-launched1 page
LepideAuditor 17.1 is now available
         
lepideauditor-suite-17-0-with-threshold-alerts-for-file-server-auditing1 page
Lepide launches LepideAuditor Suite 17.0 with brand new threshold alerts for File Server auditing
         
lepide-announces-launch-of-lepideauditor-suite-16-4-21 page
Lepide announces launch of LepideAuditor Suite 16.4.2 with several exciting new features for easier auditing
         
lepideauditor-suite-v16-4-launched1 page
Lepide launches the new and improved LepideAuditor Suite 16.4
         
lepide-active-directory-self-service-version-16-2-launched1 page
Lepide Software release Lepide Active Directory Self Service version 16.2
         
lepide-appoints-distology-as-their-uk-distributor1 page
Lepide appoints Distology as their UK distributor to help them grow their channel in the region
         
lepide-has-a-new-logo1 page
Lepide has a new logo!
         
lepideauditor-suite-16-3-with-file-server-current-permission-reporting1 page
LepideAuditor Suite 16.3 now comes with File Server Current Permission reporting
         
lepide-active-directory-self-service-16-1-launched1 page
Lepide Software has launched Lepide Active Directory Self Service 16.1 with a couple of new features
         
auditor-suite-16-2-launched1 page
Auditor Suite 16.2 launched with Active Directory and Exchange Server Permission Analysis
         
lepide-sql-storage-manager-is-now-available-for-free1 page
Lepide SQL Storage Manager is now available for Free
         
lepideauditor-for-exchange-server-review-won-silver-award1 page
LepideAuditor for Exchange Server Review won Silver Award
         
readers-choice-award-from-msexchange-org1 page
Reader’s Choice Award from MSExchange.org
         
lepideauditor-for-active-directory-wins-gold-award-by-windowsnetworking-team1 page
LepideAuditor for Active Directory Wins Gold Award by Windowsnetworking Team
         
lepide-software-pvt-ltd-is-proud-to-announce-that-we-are-now-a-certified-partner-of-microsoft1 page
Lepide Software Pvt Ltd is proud to announce that we are now a certified partner of Microsoft
         
lepideauditor-suite-16-1-launched1 page
LepideAuditor Suite 16.1 launched with File Server Auditor and Permission Analysis
         
lepide-active-directory-self-service-version-16-0-released1 page
Lepide Active Directory Self Service Version 16.0 Released
         
lepideauditor-suite-16-0-with-compliance-reports1 page
LepideAuditor Suite 16.0 with Regulatory Compliance Reports
         
lepide-active-directory-self-service-version-15-1-released1 page
Lepide Active Directory Self Service Version 15.1 Released
         
yet-another-new-release-to-the-lepide-auditor-suite-version-15-41 page
Yet another new release to the LepideAuditor Suite version 15.4
         
lepideauditor-suite-15-3-launched1 page
LepideAuditor Suite 15.3 launched
         
major-new-release-of-auditorsuite-from-lepide1 page
MAJOR new release of AuditorSuite from Lepide
         
lepideauditor-for-file-server-15-3-launched1 page
LepideAuditor for File Server 15.3 launched
         
lepide-software-announces-release-of-lepideauditor-for-file-server-version-15-21 page
Lepide Software announces release of LepideAuditor for File Server version 15.2
         
lepideauditor-suite-version-15-1-launched1 page
LepideAuditor Suite version 15.1 launched
         
lepide-software-announces-launch-of-new-version-15-2-of-the-lerm1 page
Lepide Software announces launch of new version (15.2) of the LERM
         
lepide-software-launches-upgraded-version-15-1-of-lepideauditor-for-file-server1 page
Lepide Software launches upgraded version 15.1 of LepideAuditor for File Server
         
lepide-software-launches-upgraded-version-of-lepide-active-directory-self-service-15-01 page
Lepide Software launches upgraded version of Lepide Active Directory Self Service 15.0
         
lepideauditor-for-file-server-version-15-0-launched1 page
LepideAuditor for File Server version 15.0 Launched
         
lepideauditor-suite-15-0-launched1 page
LepideAuditor Suite 15.0 launched
         
lepide-active-directory-self-service-version-14-12-launched1 page
Lepide Active Directory Self Service Version 14.12 launched
         
lepide-active-directory-self-service-version-14-11-launched1 page
Lepide Active Directory Self Service Version 14.11 launched
         
lepideauditor-suite-is-launched1 page
LepideAuditor Suite is launched
         
lepide-software-launched-lepide-active-directory-self-service-version-14-06-011 page
Lepide Software launched Lepide Active Directory Self Service version 14.06.01
         
lepideauditor-for-active-directory-version-14-06-01-launched1 page
LepideAuditor for Active Directory Version 14.06.01 Launched
         
lepide-software-launched-lepideauditor-for-file-server-version-14-05-011 page
Lepide Software launched LepideAuditor for File Server Version 14.05.01
         
lepide-software-announces-the-launch-of-lepideauditor-for-sharepoint1 page
Lepide Software announces the launch of LepideAuditor for SharePoint
         
lepide-active-directory-cleaner-launched1 page
Lepide Active Directory Cleaner launched
         
lepide-user-password-expiration-reminder-version-14-05-01-launched1 page
Lepide User Password Expiration Reminder Version 14.05.01 launched
         
lepide-software-announces-the-launch-of-lepideauditor-for-exchange-server-14-05-011 page
Lepide Software announces the launch of LepideAuditor for Exchange Server 14.05.01
         
lepide-software-announces-the-launch-of-lepideauditor-for-file-server-version-14-02-011 page
Lepide Software announces the launch of LepideAuditor for File Server Version 14.02.01
         
lepideauditor-for-exchange-server-released1 page
LepideAuditor for Exchange Server released
         
lepideauditor-for-active-directory-version-13-07-01-launched1 page
LepideAuditor for Active Directory version 13.07.01 launched
         
lepide-user-password-expiration-reminder-launched1 page
Lepide User Password Expiration Reminder Launched
         
lepideauditor-for-sql-server-launched1 page
LepideAuditor for SQL Server Launched
         
lepide-active-directory-bulk-image-editor-launched1 page
Lepide Active Directory Bulk Image Editor launched
         
lepide-software-launched-lepideauditor-for-file-server1 page
Lepide Software launched LepideAuditor for File Server
         
lepide-active-directory-manager-version-12-12-01-launched1 page
Lepide Active Directory Manager Version 12.12.01 launched
         
lepide-software-launched-lepideauditor-for-active-directory1 page
Lepide Software Launched LepideAuditor for Active Directory
         
lepide-event-log-manager-updated-version-launched1 page
Lepide Event Log Manager Updated Version Launched
         
lepide-active-directory-self-service-version-12-09-01-launched1 page
Lepide Active Directory Self Service version 12.09.01 launched
         
lepide-remote-admin-launched1 page
Lepide Remote Admin Launched
         
lepide-last-logon-reporter-launched1 page
Lepide Last Logon Reporter Launched
         
lepide-sql-storage-manager-launched1 page
Lepide SQL Storage Manager Launched
         
lem-version-12-05-01-launched1 page
LEM Version 12.05.01 Launched
         
ladss-updates-for-version-11-12-011 page
LADSS Updates for Version 11.12.01
         
lepide-event-log-manager-launched1 page
Lepide Event log Manager Launched
         
lepide-active-directory-self-service-tool-launched1 page
Lepide Active Directory Self Service Tool Launched
         
launched-lepide-free-tools1 page
Launched: Lepide Free Tools
    
webinar2 pages
Live Webinar – Every Tuesday – LepideAuditor Product Demo
Lepide Webinars
    
how-to57 pages
How-to Guides to Help You Audit Your IT Infrastructure
Auditing and Reversing Active Directory Permission Changes using LepideAuditor
How to track and troubleshoot User Account Lockouts with LepideAuditor
How to List All User Accounts on a Windows System Using PowerShell
How to Add and Remove AD Groups and Objects in Groups with PowerShell
Export Members of a Particular Active Directory Group Using PowerShell
How to Track Active Directory Users with Passwords Set to Never Expire
How to Get a List of Active Directory User Accounts Created in Last 24 hours
How to Track and Audit Active Directory Group Membership Changes
How to Manage Inactive User and Computer Accounts in Active Directory
How to Detect Last Logon Date and Time for all Active Directory Users
How to Audit Organizational Units (OUs) Changes in Active Directory
How to audit who logged into a computer and when
A Step-By-Step Guide to Restoring Deleted Objects in Active Directory
How to Track Password Changes and Resets in Active Directory
How to Monitor User Logons in Active Directory Domain
How to Track Permission Changes in Active Directory
How to Track Who Reset Password of a User in Active Directory
How to Track User and Computer Accounts Deletion in Active Directory
Audit User Account Changes in Windows Active Directory
How to Track Who Enabled a User in Active Directory
How to keep track of user creation in Active Directory
How to track Privileged Users' Activities in Active Directory
How Track Who Deleted a Group Policy Object (GPO) in Active Directory
How to delegate rights to Unlock Accounts in Active Directory
How to Track Source and Cause of Active Directory Account Lockouts
Track who, when and from where created an object in Active Directory
How to track changes made to Active Directory using native auditing
How to Enable the Security Auditing of Active Directory
How to configure the Monitoring of AD Objects in Windows Server 2012
How to Track Changes Made to Files in a Shared Folder
How to Track Permissions Applied on Files and Folders in Windows File Server
How to Track Who Accesses, Reads Files on your Windows File Servers
How to Track File and Folder Activities on Windows File Servers
Track File Deletions and Permission Changes on Windows File Servers
How to assign permissions to files and folders through Group Policy
How to Track Permission Changes on Windows File Servers
How to enable File and Folder Access Auditing on Windows Server 2012
How to track changes made to Files and Folders on Windows File Servers
How to Track and Audit Changes made to Group Policy Objects
How to Backup and Restore Group Policy Objects using PowerShell
How to Audit Permission Changes in SharePoint 2013
How to Track and Audit Changes in SharePoint Server 2016
track-most-visited-sites-in-sharepoint-2013.html
How to Track Who Accessed Mailboxes in Exchange Server 2016
A Guide to Monitor the Health Exchange Server
How to Track Permission Changes on Exchange Server Mailboxes
How to Monitor Non-Owner Mailbox Accesses on Exchange Server 2013
How to track Exchange Server Shared Mailboxes Access using EAC
How Track Change Made to Exchange 2016 by Administrators
How to Detect Mailbox Permission Changes in Exchange Online
How to Enable Auditing in SharePoint Online
A Step-By-Step Guide to Enable Mailbox Auditing of Exchange Online (Office 365)
How to Audit and Reverse User Account Changes with LepideAuditor
How to Track Soon to Expire and Expired Passwords with LepideAuditor
How to Trigger an Automated Action with LepideAuditor
How to Get Real-time Alerts on Mobile Devices with LepideAuditor
    
configurationguide20 pages
EULA.pdf
lepideauditor-app-configuration-guide.pdf
current-permission-report-configuration-guide.pdf
data-discovery-and-classification.pdf
configure-file-server-resource-manager-in-windows-server-2012-r2-and-above.pdf
configuration-guide-auditing-cloud-components.pdf
configuration-guide-siem-integration.pdf
configuration-guide-session-recording.pdf
ueba-configuration-guide.pdf
lepideauditor-solution-upgrade.pdf
lepideauditor-enable-auditing-manually.pdf
lepideauditor-configure-mailbox-auditing.pdf
lepideauditor-enable-logon-logoff-monitoring.pdf
predefined-regular-expressions-to-be-used-in-file-server-resource-manager.pdf
configure-lepideauditor-for-data-classification.pdf
auditor-suite-enable-auditing-manually.pdf
auditor-suite-configure-mailbox-auditing.pdf
auditor-suite-enable-logon-logoff-monitoring.pdf
troubleshooting-guide-suite.pdf
ladss-configuration-guide.pdf
    
compliance8 pages
gdpr-articles-lepideauditor-reports.pdf
Meet GDPR Compliance with LepideAuditor
Meet PCI Compliance with LepideAuditor
Meet HIPAA Compliance with LepideAuditor
Meet FISMA Compliance with LepideAuditor
Meet GLBA Compliance with LepideAuditor
Meet SOX Compliance with LepideAuditor
Meet Compliance Regulations with LepideAuditor
    
it-security4 pages
Detect and Prevent Privilege Abuse with LepideAuditor
Insider Threat Detection and Prevention with LepideAuditor
Ransomware Detection and Prevention with LepideAuditor
Ensure Security of Your Critical IT Systems & Data with LepideAuditor
    
industry4 pages
LepideAuditor in the Finance Industry
LepideAuditor in the Healthcare Industry
Ensure the Security of Educational Data with LepideAuditor
LepideAuditor for Public Sector Organizations
    
it-operations3 pages
Maintain Systems and Data Access with LepideAuditor
Easily Troubleshoot User Management Issues with LepideAuditor
Streamline IT Operations Tasks with the Help of LepideAuditor
    
event-log-manager11 pages
Manage Windows Event Logs with Lepide Event Log Manager
Archive and Consolidate Windows & W3C Event Logs to Central Repository
Event Logs Monitoring and Alert Generation for Critical Events
Windows & W3C Event Log Browsing For Network Wide Computers
Comprehensive Event Log Reporting and Compliance Status Reports
Download Lepide Event Log Manager For Freeware and Enterprise Edition
Free Demo for Freeware & Enterprise Edition of Lepide Event Log Manager
Release History of Lepide Event Log Manager
Download freeware version of Lepide Event Log Manager Tool
Download Enterprise version of Lepide Event Log Manager Tool
View Screenshots of Lepide Event Log Manager Software
    
active-directory-self-service12 pages
Active Directory Self Service Password Reset and Account Unlock for Users
Request a Demo for Lepide Active Directory Self Service
Self-Service Password Reset & Self Account Unlock Tool for Active Directory
how-to-deploy-gina.pdf
Configure Multifactor Policy to Self Password Reset, Account Unlock & Self Information Update
Reports on AD Self Password Reset, Account Unlocks, Changed & Expired Passwords
Lepide Active Directory Self Service - Awards & MVP Reviews
FAQs about Lepide Active Directory Self Service
Release History of Lepide Active Directory Self Service
Download Free Trial of Active Directory Self Service Software
Request a Demo for Lepide Active Directory Self Service
View Screenshots of Active Directory Self Service Tool
    
freetools13 pages
Lepide Free Tools for Auditing and IT Operations Needs
Free Lepide Active Directory Bulk Image Editor software to upload and manage Active Directory images
Lepide Remote Admin - Computer Remote Control tool to Access Remote PC from Anywhere
Free Lepide Last Logon Reporter Software
Lepide DC Monitor Software - Domain Controller Monitoring Tool
Lepide User Management - Manage Local User Accounts With Domain
Lepide Active Directory Query - Search Active Directory Query Software
Lepide Offline Folder Report - Exchange Mailbox Offline Folder Report
Free Active Directory Auditing and Change Monitoring Tool from Lepide
Free Group Policy Auditing and Change Monitoring Tool from Lepide
Free Exchange Server Auditing and Change Monitoring Tool from Lepide
View screenshots of Lepide Active Directory Bulk Image Editor Software
View Screenshots of Lepide Remote Admin
    
sql-storage-manager10 pages
Lepide SQL Storage Manager to Manage, Monitor SQL Server Space & Improve Performance
Reorganize Indexes and heaps to improve database performance
Schedule database defragmentation to improve SQL server performance.
Shrink Databases, Instances, File Groups and Files for Better Storage Management
Manage partitions using Lepide SQL Storage Manager with ease
Schedule SQL database management jobs to run at specified time
Dashboard reports to view size of disk and instances
Forecast database growth to plan for future disk space requirements
Get real time alerts on SQL events and database performance issues
Screenshots of Lepide SQL Storage Manager showing Step by Step working
    
community 606 pages
Lepide Forums
Lepide Forums
Lepide Forums FAQ
Register at Lepide Forums
All Posts
Announcements descending order
LepideAuditor descending order
LepideAuditor for File Server descending order
Lepide Active Directory Self Service descending order
Password Expiration Reminder descending order
Event Log Manager descending order
SQL Storage Manager descending order
Free Tools descending order
LepideAuditor descending order
Board FAQ
Lepide Forums
Advanced Search - Lepide Forums-
General Forum Usage
Setting and Profile Features
Reading and Posting Messages
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
[1] 2