www.lepide.com HTML Site Map
Last updated: 2023, March 20 06:02:13
Total pages: 1311
www.lepide.com Homepage
1
2
/
34 pages
blog/
1 page
data-loss-prevention-best-practices/
1 page
Data Loss Prevention Best Practices
why-education-institutions-need-to-pay-attention-to-insider-threats/
1 page
Why Education Institutions Need to Pay Attention to Insider Threats
5-ways-not-monitoring-group-policy-changes-can-lead-to-disaster/
1 page
5 Ways not Monitoring Group Policy Changes can Lead to Disaster
smbs-and-cost-effective-data-protection/
1 page
SMBs and Cost Effective Data Protection
10-tips-for-securing-windows-file-servers/
1 page
10 Tips for Securing Windows File Servers
the-number-of-data-breaches-are-increasing-at-record-pace/
1 page
The Number of Data Breaches are Increasing at “Record Pace”, According to New Report
the-warning-signs-of-a-data-breach-in-progress/
1 page
The Warning Signs of a Data Breach in Progress
database-hardening-best-practices/
1 page
Top Database Hardening Best Practices
what-is-the-nis2-directive/
1 page
What is the NIS2 Directive?
what-is-a-golden-ticket-attack/
1 page
What is a Golden Ticket Attack and How to Prevent It?
what-is-cyber-threat-intelligence/
1 page
What is Cyber Threat Intelligence?
what-is-incident-response/
1 page
What is Incident Response? A Comprehensive Guide
a-lesson-in-password-policy-and-it-security-from-peep-show/
1 page
A Lesson in Password Policy and IT Security from Peep Show
what-is-a-dns-attack/
1 page
What is a DNS Attack?
why-choose-lepideauditor-over-native-auditing-for-it-security-and-compliance/
1 page
Improving IT Security and Compliance: LepideAuditor vs Native Auditing
todays-world-requires-shared-responsibility-for-data-security/
1 page
Today’s World Requires Shared Responsibility for Data Security
insiders-are-putting-patient-data-in-healthcare-technology-at-risk/
1 page
Insiders are Putting Patient Data in Healthcare Technology at Risk
focusing-solely-on-regulatory-compliance-could-make-your-data-less-secure/
1 page
Focusing Solely on Regulatory Compliance Could Make Your Data Less Secure
detect-a-data-breach-questions-that-need-to-be-asked/
1 page
Detect a Data Breach – Questions That Need to be Asked
how-will-covid-19-affect-cybersecurity-spending/
1 page
How Will COVID-19 Affect Cybersecurity Spending?
15-data-security-predictions-for-2020/
1 page
15 Data Security Predictions for 2020
how-hyper-automation-will-affect-data-security/
1 page
How Hyper-Automation Will Affect Data Security
what-steps-can-uk-universities-take-to-prevent-a-data-breach/
1 page
What Steps Can UK Universities Take to Prevent a Data Breach?
8-key-data-security-trends-to-watch-out-for-in-2019/
1 page
8 Key Data Security Trends to Watch Out For in 2019
could-a-cyber-attack-be-the-cause-of-the-next-financial-crisis/
1 page
Could a Cyber-Attack Be the Cause of The Next Financial Crisis?
how-will-a-cyber-attack-impact-your-business/
1 page
How Will A Cyber-Attack Impact Your Business?
marriott-data-breach-all-you-need-to-know/
1 page
The Marriott Data Breach: All You Need to Know
6-tips-to-help-remote-workers-protect-their-data/
1 page
6 Tips to Help Remote Workers Protect Their Data
healthcare-public-administration-still-plagued-by-insider-threats/
1 page
Healthcare & Public Administration Still Plagued by Insider Threats
how-to-manage-privileged-users-for-better-security-and-compliance/
1 page
How to Manage Privileged Users for Better Security and Compliance
have-you-left-it-unlocked-with-the-keys-in/
1 page
Have You Left It Unlocked with The Keys In?
how-important-are-global-threat-intelligence-services-to-your-defense-strategy/
1 page
How Important are Global Threat Intelligence Services to your Defense Strategy
eight-technologies-financial-institutions-should-be-aware-of/
1 page
8 Technologies Financial Institutions Should Be Aware Of
the-top-five-mistakes-executives-make-following-a-data-breach/
1 page
The Top 5 Mistakes Executives Make Following a Data Breach
why-auditing-permissions-is-an-essential-part-of-your-it-security-plan/
1 page
Why Auditing Permissions is an Essential Part of Your IT Security Plan
governments-now-using-have-i-been-pwned-to-check-data-breach-status/
1 page
Governments Now Using “Have I Been Pwned” to Check Data Breach Status
why-it-security-is-inside-out/
1 page
Why IT Security Is Inside Out
how-uk-law-firms-can-better-protect-their-critical-assets/
1 page
How UK Law Firms Can Better Protect Their Critical Assets
10-cybersecurity-trends-to-watch-out-for-in-2019/
1 page
10 Cybersecurity Trends to Watch Out For in 2019
privileged-users-growing-threat-to-your-it-security/
1 page
A Growing Threat to your IT Security: Privileged Users
how-to-use-active-directory-services-to-meet-security-and-compliance-requirements/
1 page
How to use Active Directory Services to Meet Security and Compliance Requirements
how-to-secure-your-data-when-working-with-remote-teams/
1 page
How to Secure Your Data When Working with Remote Teams
4-ways-to-measure-your-cyber-security-effectiveness/
1 page
4 Ways to Measure Your Cyber-Security Effectiveness
what-is-personally-identifiable-information-pii-data-and-how-do-you-classify-and-secure-it/
1 page
What is Personally Identifiable Information (PII) Data and How Do You Classify and Secure it?
visibility-over-data-means-better-security-a-summary-of-infosecurity-europe-2019/
1 page
Visibility Over Data Means Better Security – A Summary of InfoSecurity Europe 2019
how-does-privilege-separation-improve-it-security/
1 page
How Does Privilege Separation Improve IT Security?
what-should-your-it-risk-assessment-focus-on/
1 page
What Should Your IT Risk Assessment Focus On?
the-5-foundations-of-data-security/
1 page
The 5 Foundations of Data Security
how-you-can-improve-data-integrity-in-3-easy-steps/
1 page
What is Data Integrity and How do Reduce Data Integrity Risk
soc-audit-checklist/
1 page
Preparing for a SOC Audit – A Checklist
the-state-of-healthcare-cyber-security-in-2018/
1 page
The State of Healthcare Cyber Security in 2018
reddit-is-sms-based-authentication-really-secure/
1 page
Reddit: Is SMS-Based Authentication Really Secure?
controlling-the-blast-radius-of-an-attack/
1 page
Controlling the Blast Radius of an Attack
are-healthcare-providers-getting-worse-at-preventing-data-breaches/
1 page
Are Healthcare Providers Getting Worse at Preventing Data Breaches?
how-much-will-a-data-breach-cost-you-and-how-can-you-reduce-it/
1 page
How Much Will a Data Breach Cost You and Can You Reduce It?
are-permissions-and-access-controls-the-answer-to-working-from-home/
1 page
Are Permissions and Access Controls the Answer to Working From Home?
how-infonomics-can-help-you-determine-your-security-budget-and-assess-your-financial-risk/
1 page
How Infonomics Can Help You Determine Your Security Budget and Assess Your Financial Risk
5-reasons-why-you-need-a-data-security-solution/
1 page
5 Reasons Why You Need a Data Security Solution
how-to-sell-cybersecurity-to-business-owners/
1 page
How to Sell Cybersecurity to Business Owners
why-transparency-and-traceability-are-important-traits-for-data-security/
1 page
Why Transparency and Traceability Are Important Traits for Data Security
the-importance-of-security-incident-reporting/
1 page
The Importance of Security Incident Reporting
why-financial-services-industry-is-seeing-an-increase-in-reported-data-breaches/
1 page
The Financial Services Industry is Seeing an Increase in Reported Data Breaches – Why?
schools-report-an-increase-in-security-incidents-since-gdpr-came-into-effect/
1 page
Schools Report an Increase in Security Incidents Since GDPR Came into Effect
a-security-strategy-for-remote-working-data-centric-audit-protection/
1 page
A Security Strategy for Remote Working: Data-Centric Audit & Protection
the-cost-of-data-breaches-in-2019/
1 page
The Cost of Data Breaches in 2019
how-to-minimize-enterprise-cyber-security-threats/
1 page
How to Minimize Enterprise Cyber-Security Threats
how-can-we-prevent-employees-violating-security-policies/
1 page
How Can We Prevent Employees Violating Security Policies?
tips-for-mitigating-data-breaches-when-using-cloud-services/
1 page
Tips for Mitigating Data Breaches When Using Cloud Services
4-security-automation-tips-for-your-business/
1 page
4 Security Automation Tips for Your Business
insider-threats-in-healthcare-280000-medicaid-patient-records-hacked/
1 page
Insider Threats in Healthcare: 280,000 Medicaid Patient Records Hacked
privileged-access-management-six-ways-it-fails-and-how-to-deal-with-it/
1 page
Privileged Access Management: 6 Ways it Fails and How to Deal With it
what-steps-can-law-firms-take-to-protect-their-confidential-data/
1 page
What Steps can Law Firms take to Protect their Confidential Data?
what-is-the-nydfs-cybersecurity-regulation-and-how-lepide-helps/
1 page
What is the NYDFS Cybersecurity Regulation and How Lepide Helps
how-to-keep-ephi-out-of-the-wrong-hands-whilst-ensuring-availability/
1 page
How to Keep ePHI Out of the Wrong Hands, Whilst Ensuring Availability
why-cybersecurity-security-isnt-just-an-it-problem/
1 page
Why Cybersecurity Security Isn’t Just an IT Problem
the-state-of-education-cyber-security-in-2018/
1 page
The State of Education Cyber-Security in 2018
the-state-of-finance-cybersecurity-in-2018/
1 page
The State of Finance Cybersecurity In 2018
maintaining-data-security-when-employees-are-fired-or-furloughed/
1 page
Maintaining Data Security When Employees Are Fired or Furloughed
most-healthcare-organizations-cant-recover-from-data-breaches/
1 page
Most Healthcare Organizations Can’t Recover from Data Breaches
ten-predictions-for-it-security-in-2018/
1 page
10 Predictions for IT Security in 2018
how-can-financial-institutions-prevent-and-recover-from-a-data-breach/
1 page
How can Financial Institutions Prevent and Recover from a Data Breach
how-can-educational-institutions-respond-to-the-growing-threat-of-a-cyber-attack/
1 page
How can Educational Institutions Respond to the Growing Threat of a Cyber-Attack?
the-10-biggest-data-security-problems-in-the-healthcare-industry/
1 page
The 10 Biggest Data Security Problems in the Healthcare Industry
a-closer-look-at-insider-threats-in-the-financial-sector/
1 page
A Closer Look at Insider Threats in the Financial Sector
insider-threats-dont-apply-to-me-do-they/
1 page
Insider Threats Don’t Apply to Me…Do They?
why-arent-consumers-angrier-about-data-breaches/
1 page
Why Aren’t Consumers Angrier About Data Breaches?
security-flaws-in-s3-buckets-are-responsible-for-many-data-breaches/
1 page
Security Flaws in S3 Buckets are Responsible for Many Data Breaches
it-security-trends-of-2018/
1 page
IT Security Trends Of 2018
using-deception-to-fight-cyber-crime/
1 page
Using Deception to Fight Cyber-Crime
does-the-uk-have-issues-employing-and-training-cybersecurity-professionals/
1 page
Does the UK Have Issues Employing and Training Cybersecurity Professionals?
eight-simple-ways-to-spot-a-potential-security-breach-with-lepideauditor/
1 page
8 Simple Ways to Spot a Potential Security Breach with LepideAuditor
10-reasons-why-you-need-lepideauditor/
1 page
10 Reasons Why You Need LepideAuditor
lepide-data-security-platform-varonis-alternative/
1 page
Varonis Alternative: Lepide Data Security Platform
how-to/
80 pages
How-to Guides
How to Track Source of Account Lockouts in Active Directory
Restore Deleted Active Directory Objects using Recycle Bin
How to Configure Alerts for Active Directory in Event Viewer
How to Monitor User Activity in Windows Computers
Identify Suspicious Insider Activity using Active Directory
Find Last Password Changed Date for an Active Directory User Account
How to Track Files by Owner with or without PowerShell
Find who has Access to what Data on Windows File Servers
How to Locate and Classify Files Containing Sensitive Data
How to Track Changes Made to Files in a Shared Folder
How to Check Permissions of Files and Folders in Windows
Auditing File Accesses, Read Events on Windows File Server
How to Audit Group Policy Changes Using Event Logs
How to Track Who Deleted a GPO in Active Directory
How to Back Up and Restore Group Policy Objects using PowerShell cmdlet
How to Check SharePoint Permissions Using Site Settings
How to Audit Permission Changes in SharePoint 2013
How to Track and Audit Changes in SharePoint Server 2016
Find the Most Visited Sites in SharePoint 2013
How to Track Who Accessed Mailboxes in Exchange Server 2016
How to Monitor the Health of Exchange Server
How to Track Permission Changes on Exchange Server Mailboxes
How to Monitor Non-Owner Mailbox Accesses on Exchange Server 2013
How to Track Exchange Server Shared Mailboxes Access using EAC
How to Track Changes Made by Administrators in Exchange 2016
Check Login Activity/History in Microsoft Office 365
Find Sensitive Data in SharePoint Online and MS Teams
Track Privilege Escalation in MS Teams and SharePoint Online
How to Audit Sharing Settings Changes in SharePoint Online
How to Track Data Access in MS Teams and SharePoint Online
How to Track Logons Outside of Trusted Locations in Azure AD
How to Trigger an Automated Action with Lepide Data Security Platform
Auditing and Reversing Active Directory Permission Changes using Lepide Active Directory Auditor
How to Track Soon to Expire Passwords with Lepide Password Manager
How to Audit and Reverse User Account Changes with Lepide Active Directory Auditor
Using Lepide Active Directory Cleaner to Mange Inactive User and Computer Accounts in AD
How to Export Active Directory Users to CSV using PowerShell
List All Active Directory Users using PowerShell
Create, Modify and Remove User in Active Directory using PowerShell
How to Detect Who Was Accessing A Shared Mailbox in Office 365 with PowerShell
Managing OUs with Windows PowerShell
How to Unlock, Enable, and Disable AD Accounts with PowerShell
How to Track Permission Changes in Active Directory
How To Check User Login History in Windows Active Directory
How to Track User and Computer Accounts Deletion in Active Directory
How to Enable the Security Auditing of Active Directory
How to Track User Logon Session Time in Active Directory
How to Find Active Directory User’s Last Logon Time and Date
How to Keep Track of Changes Made to Your Files and Folders
How to Assign Permissions to Files and Folders through Group Policy
How to Audit Permission Changes on File Servers
How to Get an NTFS Permissions Report using PowerShell
How to List All User Accounts on a Windows System Using PowerShell
How to Notify Active Directory Users When Their Password is About to Expire
Get List of Users with Password Never Expires using PowerShell
Get a SharePoint Online Permissions Report using PowerShell
How to Get a List of Active Directory User Accounts Created in Last 24 hours
Track and Audit Active Directory Group Membership Changes
How to Track Deleted Users in Azure Active Directory
How to Find and Manage Inactive Users in Active Directory
How to Track File and Folder Activities on Windows File Servers
How to Detect Mailbox Permission Changes in Exchange Online
How to Enable Auditing in SharePoint Online
How to Enable Mailbox Auditing in Office 365 (Exchange Online)
How to Track Privileged Users’ Activities in Active Directory
How to Audit Password Changes and Resets in Active Directory
How to Audit Organizational Units (OUs) Changes in Active Directory
How to Add and Remove AD Groups and Objects in Groups with PowerShell
Enable File and Folder Access Auditing on Windows Server 2012
Get Members of an Active Directory Group and Export to CSV Using PowerShell
How to Monitor User Logons in Active Directory Domain
How to Track Who Reset Password of a User in Active Directory
How to Audit User Account Changes in Active Directory
How to Track Who Enabled a User in Active Directory
How to Keep Track of User Creation in Active Directory
How to Delegate Rights to Unlock Accounts in Active Directory
How to Find Out When an Object was Created in Active Directory
How to View Active Directory Event Logs to Track Changes
Audit File and Folder Deletion on Windows File Servers
wp-includes/
1 page
wlwmanifest.xml
freeware/
10 pages
Lepide Freeware | Monitoring and Reporting Tools
Free Change Monitoring & Reporting Solution for Critical IT Systems
Active Directory Account Lockout Tool - Lepide Freeware
Open Shares & Stale Data Report | Lepide Freeware
Active Directory User Account Status | Lepide Freeware
Track Privileged Active Directory Users | Lepide Freeware
Free Active Directory Tool for Monitoring & Reporting AD Changes – Lepide
Free Group Policy Tool for Monitoring & Reporting GPO Changes - Lepide
Free Exchange Server Change Monitoring & Reporting Tool – Lepide
Lepide - Software Not Available
events/
1 page
Lepide Events
guide/
7 pages
lepide-customer-support-reference-guide.pdf
lepide-dsp-virtual-appliance-deployment-guide.pdf
user-password-expiration-reminder.pdf
how-to-use-lepide-to-report-on-external-data-sharing-in-microsoft-365.pdf
ladss-generate-P12-key.pdf
password-synchronization-configuration-for-Office-365.pdf
how-to-search-for-users-and-report-on-disabled-users-in-ladss.pdf
installationguide/
9 pages
lepide-dsp-installation-and-prerequisites-guide.pdf
file-server-quick-start-guide.pdf
file-server-advanced-configuration-guide.pdf
netapp-auditing-quick-start-guide.pdf
sharepoint-server-quick-start-guide.pdf
universal-auditing-configuration-guide.pdf
ladss-installation-configuration-guide.pdf
lelm-installation-guide.pdf
file-server-audit-installation-configuration-guide.pdf
configurationguide/
43 pages
privileged-access-management-alignment-guide.pdf
data-access-governance-alignment-guide.pdf
data-breach-alignment-guide.pdf
insider-threats-alignment-guide.pdf
enable-lepide-for-remote-workers.pdf
enable-lepide-for-ransomare.pdf
compliance-alignment-guide.pdf
license-activation-process-guide.pdf
lepide-dsp-advanced-configuration.pdf
lepide-dsp-solution-upgrade.pdf
lepide-dsp-app-configuration-guide.pdf
eDiscovery-user-guide.pdf
using-lepide-reports.pdf
how-to-configure-a-real-time-alert.pdf
data-discovery-and-classification.pdf
configuration-guide-siem-integration.pdf
configuration-guide-session-recording.pdf
lepide-dsp-enable-auditing-manually.pdf
lepide-dsp-enable-logon-logoff-monitoring.pdf
data-leakage-prevention-alignment-guide.pdf
digital-transformation-alignment-guide.pdf
data-protection-alignment-guide.pdf
threat-detection-and-response-alignment-guide.pdf
configure-threat-detection-workflow.pdf
monitor-non-owner-mailbox-access.pdf
how-to-identify-open-shares.pdf
perform-an-investigation-on-a-privileged-user.pdf
report-on-security-setting-changes-in-group-policy.pdf
how-to-use-lepide-with-your-siem-solution.pdf
report-on-activity-outside-of-business-hours.pdf
detect-when-an-email-with-sensitive-data-has-been-sent.pdf
report-on-permission-changes-to-sensitive-data-on-sharepoint-online.pdf
polp-configuration-guide.pdf
ueba-configuration-guide.pdf
configuration-guide-for-web-console.pdf
web-console-user-guide.pdf
ldsp-report-viewer-installation-instructions.pdf
current-permission-report-configuration-guide.pdf
lepide-dsp-configure-mailbox-auditing.pdf
current-permission-analysis-for-onedrive.pdf
sql-server-configuration-guide.pdf
configuring-lepide-for-microsoft-365-without-global-admin-rights.pdf
predefined-regular-expressions-to-be-used-in-file-server-resource-manager.pdf
datasheet/
38 pages
cmmc.pdf
cjis.pdf
sox.pdf
ccpa.pdf
gdpr.pdf
hipaa.pdf
LELM-datasheet.pdf
lepide-data-security-platform.pdf
threat-detection-and-response.pdf
data-access-governance.pdf
data-classification.pdf
iso-27001.pdf
glba.pdf
pci-dss.pdf
fisma.pdf
nydfs.pdf
nist-800-171.pdf
nist-csf.pdf
active-directory.pdf
group-policy.pdf
exchange-server.pdf
windows-file-server.pdf
netapp-filer.pdf
sql-server.pdf
sharepoint.pdf
office-365.pdf
exchange-online.pdf
sharepoint-online.pdf
azure-ad.pdf
ms-teams.pdf
onedrive-for-business.pdf
amazon-s3.pdf
gsuite.pdf
dropbox.pdf
datasheet-lepide-ad-self-service.pdf
datasheet-lepideadcleaner.pdf
Datasheet-LepideServerHealthCheck.pdf
datasheet-lepide-ad-gpo-restore.pdf
casestudy/
11 pages
cofm.pdf
united-dairy-farmers.pdf
spart5.pdf
cecabank.pdf
first-state-bank.pdf
venbrook-llc.pdf
first-legal.pdf
hoge-fenton.pdf
Napier.pdf
wchn.pdf
city-of-danville.pdf
quick-start-guide/
3 pages
active-directory.pdf
active-directory-cleaner.pdf
microsoft-365.pdf
infographics/
14 pages
Infographics about IT Audit, Compliance and Security from Lepide
How Can Lepide Help Your Organization Detect Insider Threats and Prevent Data Breaches
2018 Q2 Healthcare Data Breaches
Infographic - 5 Things You Need to Audit for GDPR in Active Directory
Infographic - What can you do if are the victim of a Ransomware attack
Infographic - Is Your Business Prepared for the Forthcoming GDPR
Infographic - Reacting to Ransomware Attacks Like ‘Petya’
Checklist for General Data Protection Regulation (GDPR) Compliance
Three Reasons - Why Change Control Is Important for Organizations – Infographic
What you need to know to secure your Active Directory environment
How to delegate privileges to users whilst maintaining the security of Active Directory
How to avoid privilege abuse in Active Directory to ensure security
8 critical flaws in auditing your IT Infrastructure natively
Infographic - List of Most Powerful Audit Reports in Lepide Data Security Platform
whatsnew/
1 page
whatsnew-auditorsuite16.4.pdf
1
2