www.lepide.com HTML Site Map
Last updated: 2026, March 6 13:18:36
Total pages: 1850
www.lepide.com Homepage
1
2
/
25 pages
blog/
1 page
what-is-intellectual-property-theft/
1 page
Intellectual Property Theft: What It Is and How to Prevent It
healthcare-data-security-best-practices/
1 page
Healthcare Data Security: Best Practices, Common Threats, and HIPAA
20-must-have-tools-for-sysadmins/
1 page
20 Must Have Tools for SysAdmins
best-practices-for-active-directory-domain-naming/
1 page
Best Practices for Active Directory Domain Naming
how-not-to-handle-a-data-breach-with-examples/
1 page
How NOT to Handle a Data Breach (With Examples)
national-cyber-security-awareness-month-2018-key-talking-points/
1 page
National Cyber Security Awareness Month 2018: Key Talking Points
can-a-private-blockchain-be-used-to-secure-sensitive-data/
1 page
Can a Private Blockchain Be Used to Secure Sensitive Data?
external-attacks-vs-insider-threats-where-should-your-security-budget-go/
1 page
External Attacks VS Insider Threats: Where Should Your Security Budget Go?
information-security-risk-management-how-to-get-it-right/
1 page
Information Security Risk Management: How to Get it Right
new-uk-government-cyber-security-standards-provide-framework-for-others-to-follow/
1 page
New UK Government Cyber Security Standards
how-would-your-organization-fare-if-faced-with-this-data-security-issue/
1 page
How Would Your Organization Fare if Faced with This Data Security Issue?
how-to-prevent-data-breaches-in-the-healthcare-sector/
1 page
How to Prevent Data Breaches in the Healthcare Sector
how-to-securely-store-sensitive-information/
1 page
How to Securely Store Sensitive Information
when-is-a-data-breach-really-considered-a-data-breach-in-the-usa/
1 page
When is a Data Breach Really Considered a Data Breach in the USA?
powershell-variables-how-to-name-them-and-assign-values/
1 page
PowerShell Variables: How to Name them and Assign Values
the-problem-of-privilege-management-in-data-security/
1 page
The Problem of Privilege Management in Data Security
the-importance-of-separating-duties-and-auditing-critical-changes/
1 page
The Importance of Separating Duties and Auditing Critical Changes
18-things-it-auditors-need-to-know/
1 page
18 Things IT Auditors Need to Know
four-things-you-should-know-about-it-risk-assessments/
1 page
4 Things You Should Know About IT Risk Assessments
how-lepideauditor-helps-increase-security-in-the-education-sector/
1 page
How Lepide Auditor Helps Increase Security in the Education Sector
seven-ways-to-secure-critical-data-in-the-government-sector/
1 page
7 Ways to Secure Critical Data in the Government Sector
businesses-are-failing-to-report-their-most-disruptive-data-breaches/
1 page
Businesses are Failing to Report Their Most Disruptive Data Breaches
3-things-the-deloitte-breach-can-teach-you-about-mastering-it-security/
1 page
3 Things the Deloitte Breach Can Teach You About Mastering IT Security
why-automated-response-is-critical-to-it-security/
1 page
Why Automated Response is Critical to IT Security and how Lepide helps
auditing-things-all-it-departments-need-to-know/
1 page
Things all IT departments need to know about IT auditing
the-state-of-it-auditing-today/
1 page
The state of IT auditing today
security-and-the-need-for-user-account-auditing/
1 page
Security and the need for user account auditing
can-third-party-windows-server-auditors-work-on-android-platform/
1 page
Can Third Party Windows Server Auditors Work on Android Platform?
why-you-need-centralized-event-log-management/
1 page
Why you need centralized event log management
data-loss-prevention-best-practices/
1 page
Data Loss Prevention Best Practices
common-mistakes-by-admins-in-log-analysis/
1 page
Common mistakes made by Admins during log analysis
security-flaws-in-s3-buckets-are-responsible-for-many-data-breaches/
1 page
Security Flaws in S3 Buckets are Responsible for Many Data Breaches
the-active-directory-red-forest-model/
1 page
The Active Directory Red Forest Model: Evaluating the Alternatives
top-10-audit-reports-for-it-teams/
1 page
Top 10 Audit Reports for IT Teams
to-audit-or-not-to-audit-that-is-the-question/
1 page
To audit or not to audit… that is the question
nine-ways-to-prevent-ex-employees-from-compromising-it-security/
1 page
Nine ways to Prevent Ex-employees from Compromising IT security
how-will-the-new-data-protection-bill-affect-your-company/
1 page
How will the new Data Protection Bill affect your company
how-lepide-addresses-the-gartner-top-10-security-projects-for-2019/
1 page
How Lepide Addresses the Gartner Top 10 Security Projects for 2019
what-can-hospitals-do-to-protect-themselves-from-cyber-attacks/
1 page
What can Hospitals do to Protect Themselves from Cyber-Attacks?
how-will-the-new-uk-data-protection-laws-affect-your-business/
1 page
How will the new UK Data Protection Laws affect your Business?
what-is-machine-learning/
1 page
What Is Machine Learning? Types, Challenges and How It Works
what-is-the-nis2-directive/
1 page
What is the NIS2 Directive and How to Prepare for It
database-hardening-best-practices/
1 page
Top Database Hardening Best Practices
how-to-manage-network-share-permissions/
1 page
How to Manage Network Share Permissions
why-privileged-accounts-are-a-gateway-to-cyber-attacks/
1 page
Why Privileged Accounts Are A Gateway to Cyber Attacks
how-to-make-your-security-budget-go-further/
1 page
How to Make Your Security Budget Go Further: Stop Responding and Start Preventing
why-education-institutions-need-to-pay-attention-to-insider-threats/
1 page
Why Education Institutions Need to Pay Attention to Insider Threats
smbs-and-cost-effective-data-protection/
1 page
SMBs and Cost Effective Data Protection
the-number-of-data-breaches-are-increasing-at-record-pace/
1 page
The Number of Data Breaches are Increasing at “Record Pace”, According to New Report
a-lesson-in-password-policy-and-it-security-from-peep-show/
1 page
A Lesson in Password Policy and IT Security from Peep Show
todays-world-requires-shared-responsibility-for-data-security/
1 page
Today’s World Requires Shared Responsibility for Data Security
focusing-solely-on-regulatory-compliance-could-make-your-data-less-secure/
1 page
Focusing Solely on Regulatory Compliance Could Make Your Data Less Secure
how-will-covid-19-affect-cybersecurity-spending/
1 page
How Will COVID-19 Affect Cybersecurity Spending?
15-data-security-predictions-for-2020/
1 page
15 Data Security Predictions for 2020
how-hyper-automation-will-affect-data-security/
1 page
How Hyper-Automation Will Affect Data Security
what-steps-can-uk-universities-take-to-prevent-a-data-breach/
1 page
What Steps Can UK Universities Take to Prevent a Data Breach?
8-key-data-security-trends-to-watch-out-for-in-2019/
1 page
8 Key Data Security Trends to Watch Out For in 2019
could-a-cyber-attack-be-the-cause-of-the-next-financial-crisis/
1 page
Could a Cyber-Attack Be the Cause of The Next Financial Crisis?
how-will-a-cyber-attack-impact-your-business/
1 page
How Will A Cyber-Attack Impact Your Business?
marriott-data-breach-all-you-need-to-know/
1 page
The Marriott Data Breach: All You Need to Know
6-tips-to-help-remote-workers-protect-their-data/
1 page
6 Tips to Help Remote Workers Protect Their Data
healthcare-public-administration-still-plagued-by-insider-threats/
1 page
Healthcare & Public Administration Still Plagued by Insider Threats
have-you-left-it-unlocked-with-the-keys-in/
1 page
Have You Left It Unlocked with The Keys In?
how-important-are-global-threat-intelligence-services-to-your-defense-strategy/
1 page
How Important are Global Threat Intelligence Services to your Defense Strategy
eight-technologies-financial-institutions-should-be-aware-of/
1 page
8 Technologies Financial Institutions Should Be Aware Of
the-top-five-mistakes-executives-make-following-a-data-breach/
1 page
The Top 5 Mistakes Executives Make Following a Data Breach
governments-now-using-have-i-been-pwned-to-check-data-breach-status/
1 page
Governments Now Using “Have I Been Pwned” to Check Data Breach Status
why-it-security-is-inside-out/
1 page
Why IT Security Is Inside Out
how-uk-law-firms-can-better-protect-their-critical-assets/
1 page
How UK Law Firms Can Better Protect Their Critical Assets
10-cybersecurity-trends-to-watch-out-for-in-2019/
1 page
10 Cybersecurity Trends to Watch Out For in 2019
privileged-users-growing-threat-to-your-it-security/
1 page
A Growing Threat to your IT Security: Privileged Users
how-to-use-active-directory-services-to-meet-security-and-compliance-requirements/
1 page
How to use Active Directory Services to Meet Security and Compliance Requirements
how-to-secure-your-data-when-working-with-remote-teams/
1 page
How to Secure Your Data When Working with Remote Teams
4-ways-to-measure-your-cyber-security-effectiveness/
1 page
4 Ways to Measure Your Cyber-Security Effectiveness
visibility-over-data-means-better-security-a-summary-of-infosecurity-europe-2019/
1 page
Visibility Over Data Means Better Security – A Summary of InfoSecurity Europe 2019
how-does-privilege-separation-improve-it-security/
1 page
How Does Privilege Separation Improve IT Security?
what-should-your-it-risk-assessment-focus-on/
1 page
What Should Your IT Risk Assessment Focus On?
the-5-foundations-of-data-security/
1 page
The 5 Foundations of Data Security
the-state-of-healthcare-cyber-security-in-2018/
1 page
The State of Healthcare Cyber Security in 2018
reddit-is-sms-based-authentication-really-secure/
1 page
Reddit: Is SMS-Based Authentication Really Secure?
controlling-the-blast-radius-of-an-attack/
1 page
Controlling the Blast Radius of an Attack
are-healthcare-providers-getting-worse-at-preventing-data-breaches/
1 page
Are Healthcare Providers Getting Worse at Preventing Data Breaches?
how-much-will-a-data-breach-cost-you-and-how-can-you-reduce-it/
1 page
How Much Will a Data Breach Cost You and Can You Reduce It?
are-permissions-and-access-controls-the-answer-to-working-from-home/
1 page
Are Permissions and Access Controls the Answer to Working From Home?
how-infonomics-can-help-you-determine-your-security-budget-and-assess-your-financial-risk/
1 page
How Infonomics Can Help You Determine Your Security Budget and Assess Your Financial Risk
5-reasons-why-you-need-a-data-security-solution/
1 page
5 Reasons Why You Need a Data Security Solution
how-to-sell-cybersecurity-to-business-owners/
1 page
How to Sell Cybersecurity to Business Owners
why-transparency-and-traceability-are-important-traits-for-data-security/
1 page
Why Transparency and Traceability Are Important Traits for Data Security
the-importance-of-security-incident-reporting/
1 page
The Importance of Security Incident Reporting
why-financial-services-industry-is-seeing-an-increase-in-reported-data-breaches/
1 page
The Financial Services Industry is Seeing an Increase in Reported Data Breaches – Why?
schools-report-an-increase-in-security-incidents-since-gdpr-came-into-effect/
1 page
Schools Report an Increase in Security Incidents Since GDPR Came into Effect
a-security-strategy-for-remote-working-data-centric-audit-protection/
1 page
A Security Strategy for Remote Working: Data-Centric Audit & Protection
the-cost-of-data-breaches-in-2019/
1 page
The Cost of Data Breaches in 2019
how-to-minimize-enterprise-cyber-security-threats/
1 page
How to Minimize Enterprise Cyber-Security Threats
how-can-we-prevent-employees-violating-security-policies/
1 page
How Can We Prevent Employees Violating Security Policies?
tips-for-mitigating-data-breaches-when-using-cloud-services/
1 page
Tips for Mitigating Data Breaches When Using Cloud Services
4-security-automation-tips-for-your-business/
1 page
4 Security Automation Tips for Your Business
insider-threats-in-healthcare-280000-medicaid-patient-records-hacked/
1 page
Insider Threats in Healthcare: 280,000 Medicaid Patient Records Hacked
what-steps-can-law-firms-take-to-protect-their-confidential-data/
1 page
What Steps can Law Firms take to Protect their Confidential Data?
what-is-the-nydfs-cybersecurity-regulation-and-how-lepide-helps/
1 page
What is the NYDFS Cybersecurity Regulation and How Lepide Helps
the-state-of-education-cyber-security-in-2018/
1 page
The State of Education Cyber-Security in 2018
the-state-of-finance-cybersecurity-in-2018/
1 page
The State of Finance Cybersecurity In 2018
most-healthcare-organizations-cant-recover-from-data-breaches/
1 page
Most Healthcare Organizations Can’t Recover from Data Breaches
ten-predictions-for-it-security-in-2018/
1 page
10 Predictions for IT Security in 2018
how-can-financial-institutions-prevent-and-recover-from-a-data-breach/
1 page
How can Financial Institutions Prevent and Recover from a Data Breach
how-can-educational-institutions-respond-to-the-growing-threat-of-a-cyber-attack/
1 page
How can Educational Institutions Respond to the Growing Threat of a Cyber-Attack?
a-closer-look-at-insider-threats-in-the-financial-sector/
1 page
A Closer Look at Insider Threats in the Financial Sector
is-microsoft-office-365-hipaa-compliant/
1 page
Is Microsoft Office 365 HIPAA Compliant?
gdpr-compliance-best-practices/
1 page
8 Best Practices to Stay Compliant with GDPR
13-cjis-compliance-requirements/
1 page
13 CJIS Compliance Requirements and Best Practices
why-cyber-security-isnt-just-an-it-problem/
1 page
Why Cyber Security Isn’t Just an IT Problem
active-directory-delegation-best-practices/
1 page
Active Directory Delegation Best Practices
microsoft-365-copilot-data-governance-a-complete-guide/
1 page
Microsoft 365 Copilot Data Governance – A Complete Guide
customerportal/
1 page
Log in » Lepide Customer Portal
lepideauditor/
35 pages
Active Directory (AD) Auditing Tool | Lepide Auditor
Windows File Server Auditing Software | Lepide Auditor
Microsoft 365 Auditing Tool | Lepide Auditor
Microsoft Entra ID Auditing Tool | Lepide Auditor
Exchange Auditing Tool to Audit & Report Changes – Lepide
SharePoint Auditing Tool | Lepide Auditor
SQL Server Auditing and Reporting Tool | Lepide Auditor
Nutanix Auditing and Reporting Solution from Lepide
Nasuni Auditing and Reporting Solution from Lepide
Dell EMC Data Storage Auditing and Reporting Tool
IT Auditing and Change Reporting Solution | Lepide Auditor
Group Policy Auditing Tool | Lepide Auditor
Track Active Directory Changes in Real Time with Lepide AD Auditor
Active Directory Change Auditing & Compliance Reporting
Active Directory Permission Auditing, Track Permission Changes with Lepide AD Auditor
Active Directory Monitoring Tool: Enhance Performance and Security
AD User Login History Reporting with Lepide Auditor
File Share Auditing with Lepide File Server Auditor
File Access Monitoring and Auditing Tool | Lepide Auditor
File Copy Monitoring Software | Audit File Copy Events
Track File Server Changes with Lepide File Server Auditor
NTFS Permissions Reporting Tool from Lepide
File Activity Monitoring Software | Lepide Auditor
Microsoft Office 365 Reporting Tool from Lepide
OneDrive for Business Auditing and Reporting with Lepide Data Security Platform
MS Teams Auditing Tool | Monitor User Activities | Lepide
Exchange Monitoring and Reporting Tool from Lepide
Google Workspace Auditing and Reporting Tool
NetApp Filer Auditing and Reporting Tool | Lepide Auditor
Dropbox Auditing and Reporting with Lepide Dropbox Auditor
Audit Amazon Web Services (AWS) S3 Buckets with Lepide Auditor
Audit Any On-Premise or Cloud Platform with Lepide Data Security Platform
Group Policy Change Reporting with Lepide Group Policy Auditor
Track Group Policy Changes with Lepide Group Policy Auditor in Real Time
Permission Change Analysis of Active Directory, Exchange and File Servers with Lepide Data Security Platform
data-security-platform/
43 pages
Microsoft 365 Copilot Security Monitoring | Lepide
Data Protection made Simple with Lepide.
Data Access Governance Software | Lepide
Secure Your Data in Cloud | Lepide Data Security Platform
Simplify IT Operations with Lepide Solutions
Lepide Data Security Platform – Protect Sensitive Data & Meet Compliance Mandates
Restore Deleted Active Directory Objects with Lepide
Rollback Active Directory and Group Policy Changes
Lepide Data Security Platform Mobile App
Monitor the Health of Active Directory, Exchange and SQL Server
Microsoft 365 Security with Lepide
DSPM Solution | Data Security Posture Management
Detect Compromised Users | Lepide Data Security Platform
Detect and Prevent Data Breaches with Lepide
Powerful Data Loss Prevention Software: Protect Your Data
Insider Threat Detection and Prevention with Lepide Data Security Platform
Ransomware Protection Solution – Protect Against Ransomware
Remote Worker Monitoring with Lepide Data Security Platform
Implementing Zero Trust with Lepide
Active Directory Security Tool from Lepide
Active Directory Cleanup Tool - Manage Inactive AD Users
Password Expiration Notification Tool for AD Users
Powerful Privileged Management Solution: Secure Your Access
Session Recording with Lepide Data Security Platform
Release History – Lepide Data Security Platform
report-on-administrative-group-changes.pdf
troubleshoot-account-lockouts.pdf
remind-users-to-reset-their-passwords.pdf
manage-inactive-users-in-ad.pdf
identify-users-with-admin-privileges.pdf
restore-objects-in-active-directory-with-lepide.pdf
how-to-report-and-alert-on-files-being-copied.pdf
use-lepide-to-identify-users-with-excessive-privileges-to-sensitive-data.pdf
how-to-use-lepide-to-detect-and-respond-to-ransomware.pdf
Active Directory Health Monitoring Tool – Check AD Health
Ransomware Detection and Prevention with Lepide Data Security Platform
Introducing Lepide Data Security Platform 24.4
Introducing Lepide Data Security Platform 25.1
Lepide - SIEM (Security Information and Event Management) Integrations
Introducing Lepide Data Security Platform 22.1
Digital Transformation with Lepide
Enterprise Scalability and Performance with Lepide Data Security Platform
Reduce Attack Surface Area | Lepide Data Security Platform
compliance/
11 pages
Meet Compliance Regulations with Lepide
Meet PCI Compliance Audit Mandates with Lepide
Meet GDPR Compliance Audit Mandates with Lepide
CCPA Compliance Audit Software from Lepide
Meet SOX Compliance Audit Mandates with Lepide
Meet GLBA Compliance Audit Mandates with Lepide
Meet HIPAA Compliance Audit Mandates with Lepide
Meet FISMA Compliance Audit Mandates with Lepide
CMMC Compliance Solution | Lepide
Pass CJIS Compliance Audits with Lepide
ISO 27001 Compliance | Lepide
use-cases/
1 page
Lepide Use Cases
industry/
6 pages
Ensure the Security of Educational Data with Lepide
Lepide in the Finance Industry
Lepide in the Healthcare Industry
Lepide for Public Sector Organizations
Get Full Visibility and Control on Critical Changes in Your Industry
Ensure Data Security in Technology Sector with Lepide
lepide-ai/
1 page
Lepide AI | AI-Powered Security Analytics and Audit Insights
lepide-trust/
1 page
Analyze Permissions and Implement Zero Trust | Lepide Trust
lepide-detect/
1 page
AI-Driven Threat Detection & Response Solution | Lepide Detect
lepide-identify/
3 pages
Data Classification & eDiscovery Software | Lepide Identify
Data Classification Software: Discover Sensitive Data – Lepide
Lepide eDiscovery Solution for Faster DSAR Response
lepide-protect/
1 page
Data Access and Permissions Management Software | Lepide Protect
documentation-center/
1 page
Product Documentation Center for Lepide Solutions
dsp/
1 page
Product Documentation Center for Lepide DSP
installation-and-configuration/
9 pages
How to Install and Deploy Lepide Data Security Platform
How to Install and Deploy Lepide Data Security Platform
How to Activate Lepide Data Security Platform License
How to Configure Auditing in Lepide Data Security Platform
Guide to Enable Data Classification in Lepide Data Security Platform
Documents to Configure Permission Analysis in Lepide DSP
How to Configure Real-Time Alerts in Lepide Data Security Platform
How to Configure Lepide AI in Lepide Data Security Platform
Documents to Schedule Reports in Lepide DSP
user-guides/
1 page
User Guides - Lepide Data Security Platform
alignment-guides/
13 pages
Alignment Guides - Lepide Data Security Platform
m365-copilot.pdf
data-access-governance.pdf
data-loss-prevention.pdf
digital-transformation.pdf
privileged-access-management.pdf
compliance.pdf
data-protection.pdf
insider-threats.pdf
threat-detection-and-response.pdf
remote-workers.pdf
ransomware.pdf
data-breach.pdf
upgrading-to-latest-version/
1 page
Upgrade to The Latest Version of Lepide Data Security Platform
quick-start-guides/
14 pages
lepide-ai.pdf
lepide-protect.pdf
dropbox.pdf
google-workspace.pdf
microsoft-365-copilot.pdf
nutanix.pdf
nasuni.pdf
emc-isilon.pdf
amazon-s3.pdf
microsoft-365.pdf
active-directory.pdf
active-directory-cleaner.pdf
windows-file-server.pdf
netapp.pdf
adss/
installation-and-configuration/
1 page
Product Documentation Center for Lepide AD Self Service
roi-calculator/
1 page
ROI Calculator - Lepide Data Security Platform
freeware/
10 pages
Lepide Account Lockout Examiner – Free Tool for Active Directory
Free Tool to Find Inactive or Stale User Accounts in Active Directory
Track Privileged Active Directory Users | Lepide Freeware
Active Directory User Account Status | Lepide Freeware
Free Change Monitoring & Reporting Solution for Critical IT Systems
Free Tool to Find Open Shares on Windows File Server
Lepide Freeware | Monitoring and Reporting Tools
Free Active Directory Tool for Monitoring & Reporting AD Changes – Lepide
Free Group Policy Tool for Monitoring & Reporting GPO Changes - Lepide
Free Exchange Server Change Monitoring & Reporting Tool – Lepide
freeservices/
2 pages
Active Directory Security Self-Assessment from Lepide
active-directory-sample-assessment-report.pdf
live-sessions/
59 pages
Join Our Live Expert Sessions & Watch Past Recordings | Lepide
How Pen Tests Reveal 80% of Organizations Have Critical Active Directory Weaknesses – Live Session
How to Strengthen Security Posture in an Unpredictable Threat Landscape | Live Session
The Lepide Data Security Platform – A Guided Tour
Webinar: From Visibility to Decisions: How Lepide AI Changes the Game
Live Session: Are You Ready for AI? Why Identity & Permissions Decide AI Risk
Live Session: The Real State of Active Directory Security in 2026
Live Sessions: Why Security Teams Are Switching to the Lepide Data Security Platform
Live Sessions: Active Directory at the Heart of Zero Trust
Live Sessions: Hidden Threats Lurking in Active Directory and How to Eliminate Them
Live Sessions: Why Delaying Security Fixes Costs More Than You Think
Live Sessions | Inactive Users: How to Eliminate a Hidden Threat
Upcoming Live Sessions - Is Your Microsoft 365 Environment Copilot-Ready?
Live Sessions – What is New in Lepide Data Security Platform 25.1
Live Sessions - The State of Active Directory Security in 2025
Live Sessions - From Permissions Sprawl to Zero Trust
Live Sessions - What Does Zero Trust Look Like in Practice
Live Sessions - How to Implement Least Privilege for Your Sensitive Data
Live Sessions - Security Risks Associated with Microsoft 365 Copilot and How to Overcome Them
Live Sessions - A New Approach to Protect Your Sensitive Data
Live Sessions - A Roadmap to Implement Zero Trust Security
Live Sessions - Generative AI Security Risks and How to Overcome Them
Live Sessions - Lepide Guide to Effective Data Access Governance
Live Sessions - Lepide Guide to Ransomware Detection and Response
Live Sessions - How to Effectively Audit File Server for Data Protection and Compliance
Live Sessions - Lepide Guide to Active Directory Security
Live Sessions - Using Lepide to Detect Threats, Protect Data, and Meet Compliance
Live Sessions - Data Protection Strategies to Adopt This Year
How to Enable Lepide for Privileged Access Management - Recorded Live Sessions
Live Sessions – How to Better Understand Your Privileged Users in Active Directory
How to Enable Lepide for Compliance - Recorded Live Sessions
A Complete Guide to the NIST Cybersecurity Framework - Recorded Live Sessions
How to Enable Lepide for Data Breaches - Live Sessions
How to Enable Lepide for Data Loss Prevention - Live Sessions
How to Enable Lepide for Digital Transformation - Live Sessions
How to Enable Lepide for Data Access Governance - Live Sessions
Live Sessions - The Complete Guide to Ransomware
Live Sessions - The Lepide Guide to Essential Penetration Testing Techniques
Live Sessions - Common Causes of Account Lockouts in AD and How to Troubleshoot
Top Security Events to Monitor in Microsoft 365 - Live Sessions
Active Directory and Windows Infrastructure as a Malware Tool - Live Sessions
Executive's Guide to the Business of Malware - Live Sessions
Lepide (powered by tenfold) Live Demonstration
How to Detect Threats to Data Security and Better Govern Access | Live Sessions
Live Sessions | The New US Data Privacy Environment: Are You Ready?
A Four Step Roadmap to Complying with the GLBA Safeguards Rule
Four Secrets of US HIPAA Compliance | Lepide Live Sessions
Live Sessions – How to Improve Your Data Security By Addressing the Insider Threat
Live Sessions –How to Protect Sensitive Data Whilst Using Microsoft Teams
Live Sessions – Learn How to Be Cyber-Smart for This Year's Cybersecurity Awareness Month
Live Sessions – Is "Zero Trust" the Magic Bullet for Data Security?
Live Sessions – Is "Trust but Verify" the Most Important Security Strategy?
Live Sessions – How to Detect and Respond to a Ransomware Attack
Live Sessions – How to Build a Business Case for Information Security
Live Sessions – How to Deal with the Rise of Security Threats Affecting Your Sensitive Data
Live Sessions – Why Your Legacy Security Will Fail to Protect Against Home Workers
Live Sessions – How to Implement Zero Trust with Remote Workers
Live Sessions – How to Keep Track of What Remote Workers Are Doing with Your Sensitive Data
Live Sessions – How to Maintain Data Security and Productivity with Remote Workers
whitepaper/
41 pages
Lepide Whitepapers: Cyber-Security, Ransomware and IT Auditing
Lepide Guide for Microsoft 365 Copilot
The Complete Guide to Effective Data Access Governance
Active Directory and Windows Infrastructure as a Malware Tool - Whitepaper
10 Best Practices for Keeping Active Directory Secure
Avoiding privilege abuse in Active Directory
Basic Principles for Securing Active Directory – Whitepaper
taking-active-directory-auditing-to-the-next-level.pdf
9 Critical Flaws in Auditing Active Directory Natively
Why the CISO Needs to Take a Data-Centric View on Security - Lepide Whitepaper
Whitepaper - How to Build a Business Case for Information Security
Why Visibility is the C-Suite’s Greatest Security Risk – Whitepaper
How CISOs Can Win Over the Board on Cybersecurity Strategy
The Complete Guide to CJIS Compliance for Government Bodies
The New US Data Privacy Environment | Lepide Whitepaper
Four Steps to Complying with the GLBA Safeguards Rule| Lepide Whitepaper
Four Secrets of US HIPAA Compliance | Lepide Whitepaper
The New GLBA Safeguards Rule and the Future of US Financial Industry Data Security - Whitepaper
How Auditing Helps Meet PCI DSS Compliance - Whitepaper
Executive’s Guide to the Business of Malware - Whitepaper
Popular Cyber Attack Methods and How to Mitigate Them
10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance
Is Your Organization Prepared for a Cyber-Attack?
Detecting Ransomware using File Server Auditing – Whitepaper
Generative AI Security Risks and How to Overcome Them
How to Secure and Protect Personally Identifiable Information (PII)
Do You Need A Data-Centric Audit & Protection Solution?
Executive's Guide to Essential Penetration Testing Techniques - Whitepaper
Security Monitoring: The Missing Link – Whitepaper
Insider Threats: Trust Isn’t a Security Strategy
SIEM-less Auditing - A Seamless Auditing Solution in Microsoft Windows – Whitepaper
Auditing, Logging and Alerting - Lepide Whitepaper
Identifying and Protecting PHI Within Legacy Healthcare Systems
A Guide to Cybersecurity in the Legal Sector – Whitepaper
Should the NHS Outsource Information Governance – Whitepaper
The-Current-US-Data-Privacy-Environment.pdf
a-four-step-roadmap-to-complying-with-the-safeguards-rule.pdf
the-four-secrets-of-us-hipaa-compliance.pdf
the-state-of-active-directory-security.pdf
The Complete Guide to Zero Trust for Government Bodies
The Complete Guide to Zero Trust for Education
the-state-of-active-directory-security-key-risks-to-monitor-for-2026/
1 page
Whitepaper - The State of Active Directory Security
how-to/
143 pages
How-to Guides | A Knowledgebase to Help IT Professionals
How to Change Account Lockout Policy in Active Directory
How to Disable Inactive User Accounts Using PowerShell
How to Find Out Who Unlocked a User Account in AD
How To Check FSMO Role Changes
How to Get a List of All Users from a Specific OU
How to Transfer FSMO Roles using PowerShell and ADUC
Find Who has Access to What Data on Windows File Server
Find Users Who Have Direct Permissions on File Shares
PowerShell to Find a File and Check If File Exists
How to View or Check Netapp Logs
How to Check Who Last Modified a File in Windows?
How to Find Empty Folders using PowerShell
How to Disable Control Panel using Group Policy
How to Use Group Policy to Map Network Drives on Windows
How to Audit Group Policy Changes Using Event Logs
How to Track Who Deleted a GPO in Active Directory
PowerShell to Backup and Restore Group Policy Objects
How to Get a SharePoint Permissions Report using PowerShell
How to Check Who Deleted a File on SharePoint
How to Check SharePoint Permissions for a User and Group
How to Audit SharePoint Permissions Changes
How to Audit SharePoint Changes by viewing Audit Logs
How To Check SharePoint Site Usage
How to Compare Permissions in Exchange Server
How to Track Who Accessed Mailboxes in Exchange Server 2016
How to Monitor the Health of Exchange Server
How to Track Permission Changes on Exchange Server Mailboxes
How to Track Exchange Server Shared Mailboxes Access using EAC
How to Track Changes Made by Exchange Administrators
What is Entra ID Sign-in Error Code 50126?
How to Find Admin Users in Microsoft 365
How to Enable Auditing and Check MS Teams Audit Logs
How to Find Azure AD Sign-in Logs Using PowerShell
How to Check Entra ID (Azure AD) Activity/Audit Logs
How to Create and Manage Access Review in Microsoft Entra ID
How to List and Filter Users in Entra ID using PowerShell
How to Use Remove-Item PowerShell cmdlet to Delete Files
How to Get an Access Control List (ACL) for Folders and Subfolders
How to Monitor New File Creation in Folders with PowerShell
PowerShell to List Scheduled Tasks on Windows Machines
Guide to Use Get-ADComputer Cmdlet in PowerShell
How to Get User Permissions in SQL Server
How to Track Login Password Changes in SQL Server
How to View SQL Server Database File Locations
How to List User Roles in SQL Server
How to Enable SQL Server Auditing and View Audit Logs
Find Account Lockout Source and Cause in Active Directory
How to Get AD User Group Membership using PowerShell
How to Check Active Directory Audit Logs in Event Viewer
How to Unlock, Enable, and Disable AD Accounts with PowerShell
Check User Login History in Windows Active Directory
How to Audit Permissions Changes in Active Directory
How to Audit File Access Events on Windows File Server
PowerShell to Get NTFS Permissions Report on Folders & Files
How to Audit Permission Changes on File Servers
Assign Permissions to Files & Folders using Group Policy
How to Audit File and Folder Deletion on Windows File Server
Restore Active Directory Deleted Objects Using Recycle Bin
How to View Audit Logs in SharePoint Online
Get SharePoint Online Permissions Report using PowerShell
Find Sensitive Data in SharePoint Online and MS Teams
How to Enable Mailbox Auditing in Office 365 (Exchange Online)
How to Detect Mailbox Permission Changes in Exchange Online
Check Login Activity/History in Microsoft Office 365
How to Track Logons Outside of Trusted Locations in Azure AD
How to Track Deleted Users in Azure Active Directory
How to View Microsoft 365 Login Attempts
Track Privilege Escalation in MS Teams and SharePoint Online
How to Track Data Access in MS Teams and SharePoint Online
Monitoring File and Folder Activities on Windows File Server
How to Export AD Users to CSV with PowerShell
Get-ADGroupMember PowerShell to List Members of AD Group
Get-ADUser PowerShell to List All Active Directory Users
How to Track Privileged Users’ Activities in Active Directory
How to Find Inactive User Accounts in Active Directory
Active Directory Users & Computers (ADUC) Installation Guide
How to Audit Active Directory Group Membership Changes
PowerShell to Create New Users in Active Directory
How to Audit User Account Changes in Active Directory
How to Check Password Change History in Active Directory
Enable Active Directory Auditing – A Step-by-Step Guide
Identify Suspicious Insider Activity using Active Directory
Find Source of Failed Logon Attempts in Active Directory
Find Weak Passwords in Active Directory with PowerShell
How to Track Active Directory User Logon/Logoff Time
How to Find Active Directory User’s Last Logon Date & Time
How to Check Files and Folders Permissions in Windows
What is Active Directory Recycle Bin and How to Enable It?
How to Find Who Deleted a User Account in Active Directory
Find and Classify Sensitive Data Files with FSRM on Windows File Server
How to Audit Active Directory Changes using Event Logs
How to Audit Organizational Units (OUs) Changes in Active Directory
How to Setup a Domain Controller on Windows Server
Check AD User Last Password Change Date with PowerShell
How to Delegate Rights to Unlock Accounts in Active Directory
PowerShell to List Domain Controllers in Active Directory
How to Reset Passwords in Active Directory
How To Create an Event Log Clear Report
How to Find Bad Password Attempts in Active Directory
Get List of Users with Password Never Expires using PowerShell
Track File and Folder Changes/Modifications on Windows Server
How to Audit Sharing Settings Changes in SharePoint Online
How to Find who Added a User to the Domain Admins Group
How to Automate PowerShell Scripts with Task Scheduler
How to Check Active Directory Replication
How to Detect Illicit Applications in Microsoft Entra ID
What is Error Code: 53003 and How to Fix it?
How To Check if MFA is Enabled in Microsoft 365
Get-Mguser (MS Graph) PowerShell to Get & Export Azure AD Users to CSV
How to Audit Account Logon Events in Active Directory
How to List All Computers in an OU using PowerShell
List Shared Mailboxes Members & Permissions with PowerShell
How to Check the Health of Active Directory
How to Get an Exchange Online Mailbox Permissions Report
Troubleshoot AD Domain Controller could not be Contacted
How to Find Out Who Changed the File and Folder Permissions
How to Get an External Sharing Report in SharePoint Online
How to Set up Alerts in SharePoint Online
How to Set Up Alerts in Exchange Online
How to Export Folder Permissions to CSV using PowerShell
How To Enable File and Folder Auditing on Windows Server
How to Fix Broken Registry Items in Windows
How to Compare Permissions in File Server
PowerShell to Find Files by Owners on Windows File Server
How to Check Who Disabled a User Account in Active Directory
How to Get an Active Directory User Permissions Report
Audit Permission Changes in OneDrive for Business Objects
How to Track Who Created a User Account in Active Directory
How to Track Who Enabled a User in Active Directory
How to Compare Permissions in Active Directory
PowerShell Get-ADGroup to List Active Directory Groups
How to Get Disabled Active Directory Users with PowerShell
How to Track Shared Mailbox Access in Office 365 with PowerShell
Manage Active Directory Organizations Units with PowerShell
How to Configure Alerts for Active Directory in Event Viewer
Check Who accessed a Shared Folder and Made File Changes
PowerShell Get-LocalUser to List All Local Users on Windows
How to Monitor User Activity in Windows Computers
How to Set Active Directory Password Expiration Notification
How to Get a List of Active Directory User Accounts Created in Last 24 hours
How to Add and Remove AD Groups and Members with PowerShell
How to Find Out When an Object was Created in Active Directory
policytemplates/
3 pages
Active Directory and Data Security Policy Templates
Free Active Directory Security Policy Template from Lepide
Free Data Access Governance Policy Template from Lepide
ebook/
5 pages
Lepide eBooks for Identity Security, Data Security, and Compliance
The Complete Guide to Data Protection | eBook
The Complete Guide to the NIST Cybersecurity Framework
The Complete Guide to Ransomware | Ransomware eBook
lepide-guide-to-nist-csf.pdf
cyber-learning/
1 page
Cyber Learning With Lepide
what-is-an-insider-threat/
1 page
What is an Insider Threat? Types, Common Indicators and Examples
what-is-ransomware/
1 page
What is Ransomware and How Does it Work
what-is-customer-identity-and-access-management/
1 page
What is Customer Identity and Access Management (CIAM)?
what-is-database-activity-monitoring-dam/
1 page
What is Database Activity Monitoring (DAM)?
what-is-credential-harvesting/
1 page
What Is Credential Harvesting?
data-classification-software-and-tools/
1 page
Data Classification Software and Tools: Advantages & Best Practices
what-is-a-dcsync-attack/
1 page
DCSync Attack and How to Protect Active Directory Against It
what-is-dcshadow-attack/
1 page
What is DCShadow Attack and How to Protect Against It?
what-is-vendor-privileged-access-management/
1 page
What is Vendor Privileged Access Management (VPAM)?
pam-vs-pim/
1 page
PAM vs PIM: Privileged Identity Management Explained
what-is-user-activity-monitoring-uam/
1 page
What is User Activity Monitoring? Benefits & Best Practices
what-is-secrets-management/
1 page
What is Secrets Management? Challenges and Best Practices
what-is-privileged-access-management-as-a-service-pamaas/
1 page
What is Privileged Access Management as a Service (PAMaaS)?
endpoint-privilege-management/
1 page
What is Endpoint Privilege Management (EPM)?
what-is-the-nist-cybersecurity-framework/
1 page
What is NIST CSF and 5 Core Elements Cybersecurity Framework
what-is-saml/
1 page
What is SAML and How SAML Authentication Works
what-is-user-and-entity-behavior-analytics-ueba/
1 page
What is User and Entity Behavior Analytics (UEBA)?
what-is-data-loss-prevention-dlp/
1 page
What Is Data Loss Prevention? DLP Types and How It Works
what-is-personally-identifiable-information-pii/
1 page
What Is Personally Identifiable Information (PII)? A Complete Guide
what-is-the-cyber-kill-chain/
1 page
What is the Cyber Kill Chain? Phases and Its Role in Cybersecurity
what-is-a-brute-force-attack/
1 page
What is a Brute Force Attack? Types and How to Defend Against Them
what-is-a-proxy-server/
1 page
What is a Proxy Server? Definition, Type and How It Works
what-is-pgp-encryption/
1 page
What is PGP Encryption? How It Works and Common Uses
what-is-an-smb-port/
1 page
What is an SMB Port? Ports 445 and 139 Guide
red-team-vs-blue-team-the-key-difference/
1 page
Red Team vs Blue Team: The Key Difference
what-is-zero-trust-security/
1 page
What is Zero Trust Security? Core Principles & How It Works
what-is-the-mitre-attack-framework/
1 page
What is the MITRE ATT&CK Framework?
what-is-a-computer-worm/
1 page
What is a Computer Worm and How Does It Work?
what-is-a-log-file/
1 page
What is a Log File? Importance and Log File Types
what-is-azure-kubernetes-service-aks/
1 page
What Is Azure Kubernetes Service (AKS)?
what-is-crud/
1 page
What is CRUD? Create, Read, Update, and Delete
what-is-a-keylogger/
1 page
What is a Keylogger? How to Protect Against It?
what-is-logging-as-a-service-laas/
1 page
What is Logging as a Service (LaaS)?
what-is-mdr-managed-detection-and-response/
1 page
What is MDR (Managed Detection and Response)?
what-is-spear-phishing/
1 page
What is Spear Phishing and How It Works?
what-is-a-trojan-horse/
1 page
What is a Trojan Horse? How Can You Detect and Prevent It?
what-is-a-zero-day-attack/
1 page
What is a Zero-Day Attack and How to Prevent It?
category/
cybersecurity/
1 page
Cybersecurity Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
general/
1 page
General Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
malware/
1 page
Malware Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
log-management/
1 page
Log Management Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
api/
1 page
API Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
news/
1 page
Latest News and Updates – Lepide Software
lepide-ai-transforming-security-from-visibility-into-action/
1 page
Lepide Launches Lepide AI, Transforming Directory and Data Security from Visibility into Action
lepide-launches-free-tool-to-identify-inactive-active-directory-accounts/
1 page
Lepide Launches Free Tool to Identify Inactive Active Directory Accounts
lepide-launches-free-active-directory-risk-assessment-tool/
1 page
Lepide Launches Free Active Directory Risk Assessment Tool to Help Organizations Combat Identity-Based Attacks
lepide-unleashes-ai-led-lepide-protect/
1 page
Lepide Unleashes AI-Led Lepide Protect: A Game-Changer for Permissions Management and Zero Trust
lepide-unveils-major-update-to-active-directory-self-service-platform/
1 page
Lepide Unveils Major Update to Active Directory Self Service Platform
lepide-introduces-copilot-security-in-data-security-platform-24-4/
1 page
Lepide Introduces Copilot Security in Data Security Platform 24.4
category/
new-launch/
1 page
New Launches Archives - Latest News and Updates - Lepide Software - Latest News and Updates – Lepide Software
announcement/
1 page
Announcements Archives - Latest News and Updates - Lepide Software - Latest News and Updates – Lepide Software
product-update/
1 page
Product Updates Archives - Latest News and Updates - Lepide Software - Latest News and Updates – Lepide Software
lepide-introduces-universal-auditing-and-data-classification-for-exchange/
1 page
Lepide Introduces Universal Auditing and Data Classification for Exchange
lepide-releases-active-directory-account-lockout-examiner-freeware-and-three-other-free-tools-to-help-improve-data-security/
1 page
Lepide Releases Active Directory Account Lockout Examiner Freeware and Three Other Free Tools to Help Improve Data Security
lepideauditor-suite-is-launched/
1 page
LepideAuditor Suite is launched
lepide-and-liverton-join-forces-to-enhance-data-loss-prevention/
1 page
Lepide and Liverton Join Forces to Enhance Data Loss Prevention Across Microsoft Exchange and Outlook
lepide-joins-forces-with-spirion/
1 page
Lepide Joins Forces with Spirion to Enhance Data Security Posture Management
lepide-statement-on-cve-2021-44228-the-apache-log4j-vulnerability/
1 page
Lepide Statement On CVE-2021-44228, The Apache Log4j Vulnerability
lepide-data-security-platform-21-2-introduces-a-brand-new-web-interface-for-reports/
1 page
Lepide Data Security Platform 21.2 Introduces a Brand New Web Interface for Reports
lepide-unveils-version-24-3-of-its-data-security-platform/
1 page
Lepide Unveils Version 24.3 of its Data Security Platform
lepide-data-security-platform-version-24-2-luanched/
1 page
Lepide Extends the Coverage of its Award-Winning Data Security Platform to Dell EMC Isilon
lepide-software-announces-the-launch-of-lepideauditor-for-sharepoint/
1 page
Lepide Software announces the launch of LepideAuditor for SharePoint
lepide-data-security-platform-24-0-1-launched/
1 page
Lepide Data Security Platform 24.0.1 Deepens Data Security for Microsoft 365 Components
lepide-data-security-platform-version-23-1/
1 page
Lepide Data Security Platform Version 23.1 Sees the Web Console Move Out of Beta
lepide-announces-strategic-partnership-with-atakama-to-further-secure-sensitive-data/
1 page
Lepide Announces Strategic Partnership with Atakama to Further Secure Sensitive Data
lepide-data-security-platform-22-1-makes-reporting-more-accessible-and-user-friendly/
1 page
Lepide Data Security Platform 22.1 Makes Reporting More Accessible and User-Friendly Through a Comprehensive Web Console
lepide-active-directory-self-service-22-1-released/
1 page
Further Improve the Security of Active Directory with Lepide Active Directory Self Service 22.1
lepide-data-security-platform-21-1-now-scales-better-than-any-other-solution-in-the-market/
1 page
Lepide Data Security Platform 21.1 Now Scales Better Than Any Other Solution in the Market
lepide-data-security-platform-20-2-released/
1 page
Lepide Data Security Platform 20.2 – Improve the Security of Microsoft Teams
automatically-block-compromised-user-accounts-with-lepide-active-directory-self-service-20-1/
1 page
Automatically Block Compromised User Accounts with Lepide Active Directory Self Service 20.1
lepide-and-sherpa-announce-strategic-partnership/
1 page
Lepide and Sherpa Announce Strategic Partnership
find-out-what-your-data-is-really-worth-with-lepide-data-security-platform-20-1/
1 page
Find Out What Your Data Is Really Worth with Lepide Data Security Platform 20.1
lepideauditor-is-now-lepide-data-security-platform/
1 page
LepideAuditor Is Now Lepide Data Security Platform
lepide-introduces-data-risk-analysis-dashboard-to-easily-identify-risks-to-data-security/
1 page
Lepide Introduces Data Risk Analysis Dashboard to Help Organizations Easily Identify Risks to Data Security
lepide-grows-team-of-product-experts-in-the-usa/
1 page
Lepide Grows Team of Product Experts in the USA
lepideauditor-19-2-improves-upon-data-discovery-by-removing-false-positives/
1 page
LepideAuditor 19.2 Improves Upon Data Discovery by Removing False Positives
lepide-joins-forces-with-dutch-technology-experts/
1 page
Lepide Joins Forces with Dutch Technology eXperts to Provide Data-Centric Audit & Protection to the Benelux Region
on-the-fly-classification-introduced-into-lepideauditor-19-1/
1 page
“On the Fly” Classification Introduced into LepideAuditor 19.1
active-directory-self-service-19-0-introduces-a-new-and-improved-user-interface/
1 page
Active Directory Self Service 19.0 Introduces a New and Improved User Interface
lepideauditor-19-0-improves-further-on-data-discovery-and-classification-and-data-security-analytics/
1 page
LepideAuditor 19.0 Improves Further on Data Discovery and Classification and Data Security Analytics
track-users-and-objects-with-excessive-permissions-with-lepideauditor-18-7/
1 page
Easily Identify Users and Objects with Excessive Permissions with LepideAuditor 18.7
lepideauditor-now-includes-data-discovery-and-classification/
1 page
LepideAuditor Now Includes Data Discovery and Classification
lepidemigrator-for-exchange-moves-to-kernel/
1 page
LepideMigrator for Exchange moves to Kernel
lepideauditor-18-5-introduces-anomaly-spotting-to-improve-user-entity-behavior-analytics/
1 page
LepideAuditor 18.5 Introduces Anomaly Spotting to Improve User & Entity Behavior Analytics
lepideauditor-18-4-released/
1 page
LepideAuditor 18.4 Introduces a Brand-New Interactive Access Governance Insights Dashboard and G Suite Auditing
lepide-active-directory-self-service-version-18-1-released/
1 page
Lepide Releases Version 18.1 of Active Directory Self Service Solution with New Search Capabilities
lepideauditor-18-3-now-integrates-with-any-siem-solution-and-introduces-amazon-web-services-auditing/
1 page
LepideAuditor 18.3 now integrates with any SIEM Solution and Introduces Amazon Web Services Auditing
lepideauditor-18-1-now-audits-cloud-components/
1 page
LepideAuditor 18.1 Now Audits Dropbox, Azure AD and OneDrive for Business
lepideauditor-18-0-now-including-open-share-analysis/
1 page
Launch of LepideAuditor 18.0 – Now Including Open Share Analysis
launch-of-lepideauditor-17-5-4-now-with-integrated-data-discovery-and-classification/
1 page
Launch of LepideAuditor 17.5.4 – Now with Integrated Data Discovery and Classification
lepide-launches-active-directory-self-service-18-0/
1 page
Lepide Launches Active Directory Self Service 18.0: Now with Automated Script Execution
easily-meet-gdpr-compliance-with-lepideauditor-17-5/
1 page
Easily meet GDPR compliance with LepideAuditor 17.5
audit-sharepoint-online-with-lepideauditor-17-4/
1 page
Audit SharePoint Online with LepideAuditor 17.4
lepideauditor-17-3-with-netapp-cluster-mode-auditing/
1 page
Launch of LepideAuditor 17.3 – Now with NetApp Cluster Mode auditing
launch-of-lepideauditor-17-2/
1 page
Launch of LepideAuditor 17.2
lepide-exchange-recovery-manager-moves-to-kernel/
1 page
Lepide Exchange Recovery Manager moves to Kernel
lepide-active-directory-self-service-17-0-is-now-available/
1 page
Lepide Active Directory Self Service 17.0 is now available
lepideauditor-17-1-launched/
1 page
LepideAuditor 17.1 is now available
lepideauditor-suite-17-0-with-threshold-alerts-for-file-server-auditing/
1 page
Lepide launches LepideAuditor Suite 17.0 with brand new threshold alerts for File Server auditing
lepide-announces-launch-of-lepideauditor-suite-16-4-2/
1 page
Lepide announces launch of LepideAuditor Suite 16.4.2 with several exciting new features for easier auditing
lepideauditor-suite-v16-4-launched/
1 page
Lepide launches the new and improved LepideAuditor Suite 16.4
lepide-active-directory-self-service-version-16-2-launched/
1 page
Lepide Software release Lepide Active Directory Self Service version 16.2
lepide-appoints-distology-as-their-uk-distributor/
1 page
Lepide appoints Distology as their UK distributor to help them grow their channel in the region
lepide-has-a-new-logo/
1 page
Lepide has a new logo!
lepideauditor-suite-16-3-with-file-server-current-permission-reporting/
1 page
LepideAuditor Suite 16.3 now comes with File Server Current Permission reporting
lepide-active-directory-self-service-16-1-launched/
1 page
Lepide Software has launched Lepide Active Directory Self Service 16.1 with a couple of new features
auditor-suite-16-2-launched/
1 page
Auditor Suite 16.2 launched with Active Directory and Exchange Server Permission Analysis
lepideauditor-suite-16-1-launched/
1 page
LepideAuditor Suite 16.1 launched with File Server Auditor and Permission Analysis
lepide-active-directory-self-service-version-16-0-released/
1 page
Lepide Active Directory Self Service Version 16.0 Released
lepideauditor-suite-16-0-with-compliance-reports/
1 page
LepideAuditor Suite 16.0 with Regulatory Compliance Reports
lepide-active-directory-self-service-version-15-1-released/
1 page
Lepide Active Directory Self Service Version 15.1 Released
yet-another-new-release-to-the-lepide-auditor-suite-version-15-4/
1 page
Yet another new release to the LepideAuditor Suite version 15.4
lepideauditor-suite-15-3-launched/
1 page
LepideAuditor Suite 15.3 launched
major-new-release-of-auditorsuite-from-lepide/
1 page
MAJOR new release of AuditorSuite from Lepide
lepide-software-announces-release-of-lepideauditor-for-file-server-version-15-2/
1 page
Lepide Software announces release of LepideAuditor for File Server version 15.2
lepideauditor-suite-version-15-1-launched/
1 page
LepideAuditor Suite version 15.1 launched
lepide-software-announces-launch-of-new-version-15-2-of-the-lerm/
1 page
Lepide Software announces launch of new version (15.2) of the LERM
lepide-software-launches-upgraded-version-15-1-of-lepideauditor-for-file-server/
1 page
Lepide Software launches upgraded version 15.1 of LepideAuditor for File Server
lepide-software-launches-upgraded-version-of-lepide-active-directory-self-service-15-0/
1 page
Lepide Software launches upgraded version of Lepide Active Directory Self Service 15.0
lepideauditor-for-file-server-version-15-0-launched/
1 page
LepideAuditor for File Server version 15.0 Launched
lepideauditor-suite-15-0-launched/
1 page
LepideAuditor Suite 15.0 launched
lepide-active-directory-self-service-version-14-12-launched/
1 page
Lepide Active Directory Self Service Version 14.12 launched
lepide-active-directory-self-service-version-14-11-launched/
1 page
Lepide Active Directory Self Service Version 14.11 launched
lepide-sql-storage-manager-is-now-available-for-free/
1 page
Lepide SQL Storage Manager is now available for Free
lepide-software-launched-lepide-active-directory-self-service-version-14-06-01/
1 page
Lepide Software launched Lepide Active Directory Self Service version 14.06.01
lepideauditor-for-active-directory-version-14-06-01-launched/
1 page
LepideAuditor for Active Directory Version 14.06.01 Launched
lepide-software-launched-lepideauditor-for-file-server-version-14-05-01/
1 page
Lepide Software launched LepideAuditor for File Server Version 14.05.01
lepide-active-directory-cleaner-launched/
1 page
Lepide Active Directory Cleaner launched
lepide-user-password-expiration-reminder-version-14-05-01-launched/
1 page
Lepide User Password Expiration Reminder Version 14.05.01 launched
lepide-software-announces-the-launch-of-lepideauditor-for-exchange-server-14-05-01/
1 page
Lepide Software announces the launch of LepideAuditor for Exchange Server 14.05.01
lepide-software-announces-the-launch-of-lepideauditor-for-file-server-version-14-02-01/
1 page
Lepide Software announces the launch of LepideAuditor for File Server Version 14.02.01
lepideauditor-for-exchange-server-review-won-silver-award/
1 page
LepideAuditor for Exchange Server Review won Silver Award
lepideauditor-for-exchange-server-released/
1 page
LepideAuditor for Exchange Server released
lepideauditor-for-active-directory-version-13-07-01-launched/
1 page
LepideAuditor for Active Directory version 13.07.01 launched
readers-choice-award-from-msexchange-org/
1 page
Reader’s Choice Award from MSExchange.org
lepide-user-password-expiration-reminder-launched/
1 page
Lepide User Password Expiration Reminder Launched
lepideauditor-for-sql-server-launched/
1 page
LepideAuditor for SQL Server Launched
lepideauditor-for-active-directory-wins-gold-award-by-windowsnetworking-team/
1 page
LepideAuditor for Active Directory Wins Gold Award by Windowsnetworking Team
lepide-software-launched-lepideauditor-for-file-server/
1 page
Lepide Software launched LepideAuditor for File Server
lepide-active-directory-manager-version-12-12-01-launched/
1 page
Lepide Active Directory Manager Version 12.12.01 launched
lepide-software-launched-lepideauditor-for-active-directory/
1 page
Lepide Software Launched LepideAuditor for Active Directory
lepide-event-log-manager-updated-version-launched/
1 page
Lepide Event Log Manager Updated Version Launched
lepide-software-pvt-ltd-is-proud-to-announce-that-we-are-now-a-certified-partner-of-microsoft/
1 page
Lepide Software Pvt Ltd is proud to announce that we are now a certified partner of Microsoft
lepide-active-directory-self-service-version-12-09-01-launched/
1 page
Lepide Active Directory Self Service version 12.09.01 launched
lepide-remote-admin-launched/
1 page
Lepide Remote Admin Launched
lepide-sql-storage-manager-launched/
1 page
Lepide SQL Storage Manager Launched
ladss-updates-for-version-11-12-01/
1 page
LADSS Updates for Version 11.12.01
lepide-active-directory-self-service-tool-launched/
1 page
Lepide Active Directory Self Service Tool Launched
launched-lepide-free-tools/
1 page
Launched: Lepide Free Tools
careers/
7 pages
Lepide Careers
Job Opening for Sales Development Representative Team Leader
Job Opening for Product Developer
Job Opening for Account Manager - London
Job Opening for Account Manager - Austin
Job Application for
Lepide Careers | PHP Developer
guide/
7 pages
lepide-customer-support-reference-guide.pdf
lepide-dsp-virtual-appliance-deployment-guide.pdf
user-password-expiration-reminder.pdf
how-to-use-lepide-to-report-on-external-data-sharing-in-microsoft-365.pdf
ladss-generate-P12-key.pdf
password-synchronization-configuration-for-Office-365.pdf
how-to-search-for-users-and-report-on-disabled-users-in-ladss.pdf
partnersportal/
2 pages
Log in » Lepide Partner Portal
Lost password » Lepide Partner Portal
active-directory-self-service/
10 pages
Active Directory Self Service Password Reset and Account Unlock for Users
how-to-deploy-gina.pdf
Release History of Lepide Active Directory Self Service
FAQs about Lepide Active Directory Self Service
Download Free Trial of Active Directory Self Service Software
Self-Service Password Reset & Self Account Unlock Tool for Active Directory
Configure Multifactor Policy to Self Password Reset, Account Unlock & Self Information Update
Reports on AD Self Password Reset, Account Unlocks, Changed & Expired Passwords
Request a Demo for Lepide Active Directory Self Service
Request a Quote for Lepide Active Directory Self Service
casestudy/
14 pages
spart5.pdf
Napier.pdf
first-state-bank.pdf
venbrook-llc.pdf
cecabank.pdf
first-legal.pdf
wchn.pdf
cofm.pdf
city-of-danville.pdf
nhs.pdf
santa-coloma-de-gramenet-city-hall.pdf
us-government.pdf
united-dairy-farmers.pdf
hoge-fenton.pdf
by-usecase/
9 pages
compliance.pdf
preventing-permissions-sprawl.pdf
ransomware.pdf
active-directory-security.pdf
microsoft-365-security.pdf
data-breaches.pdf
data-loss-prevention.pdf
data-access-governance.pdf
insider-threats.pdf
real-world-examples/
3 pages
marriott-international-data-breach.pdf
tesla-insider-threat.pdf
colonial-pipeline-attack.pdf
datasheet/
47 pages
lepide-data-security-platform.pdf
lepide-auditor.pdf
lepide-trust.pdf
lepide-detect.pdf
lepide-protect.pdf
lepide-identify.pdf
lepide-ai.pdf
iso-27001.pdf
glba.pdf
gdpr.pdf
hipaa.pdf
pci-dss.pdf
fisma.pdf
nydfs.pdf
nist-800-171.pdf
nist-csf.pdf
cjis.pdf
cmmc.pdf
sox.pdf
ccpa.pdf
active-directory.pdf
windows-file-server.pdf
microsoft-365.pdf
m365-copilot-security.pdf
group-policy.pdf
exchange.pdf
netapp-filer.pdf
sql-server.pdf
sharepoint.pdf
sharepoint-online.pdf
entra-id.pdf
nutanix.pdf
ms-teams.pdf
onedrive-for-business.pdf
amazon-s3.pdf
google-workspace.pdf
dropbox.pdf
nasuni.pdf
datasheet-lepide-ad-self-service.pdf
datasheet-lepideadcleaner.pdf
LELM-datasheet.pdf
Datasheet-LepideServerHealthCheck.pdf
datasheet-lepide-ad-gpo-restore.pdf
exchange-online.pdf
threat-detection-and-response.pdf
data-access-governance.pdf
data-classification.pdf
configurationguide/
40 pages
group-policy-comparison-user-flow-guide.pdf
create-credentials-for-lepide-ai.pdf
setup-open-ai-model-to-use-in-lepide.pdf
how-to-use-explore-backup-functionality.pdf
lepide-iq-user-guide.pdf
configuring-lepide-using-polp.pdf
schedule-daily-summary-reports.pdf
data-discovery-and-classification.pdf
data-retention.pdf
create-certificate-for-tenant.pdf
connect-for-spirion.pdf
stale-data-reporting.pdf
configure-a-threat-detection-workflow.pdf
current-permission-report-configuration-guide.pdf
license-activation-process-guide.pdf
active-directory-advanced-configuration-guide.pdf
lepide-dsp-solution-upgrade.pdf
configuration-guide-for-web-console.pdf
lepide-dsp-app-configuration-guide.pdf
eDiscovery-user-guide.pdf
web-console-user-guide.pdf
using-lepide-reports.pdf
how-to-configure-a-real-time-alert.pdf
configuration-guide-siem-integration.pdf
configuration-guide-session-recording.pdf
lepide-dsp-enable-auditing-manually.pdf
lepide-dsp-enable-logon-logoff-monitoring.pdf
monitor-non-owner-mailbox-access.pdf
how-to-identify-open-shares.pdf
perform-an-investigation-on-a-privileged-user.pdf
report-on-security-setting-changes-in-group-policy.pdf
how-to-use-lepide-with-your-siem-solution.pdf
report-on-activity-outside-of-business-hours.pdf
detect-when-an-email-with-sensitive-data-has-been-sent.pdf
report-on-permission-changes-to-sensitive-data-on-sharepoint-online.pdf
ueba-configuration-guide.pdf
lepide-dsp-configure-mailbox-auditing.pdf
sql-server-configuration-guide.pdf
identify-users-with-excessive-privileges.pdf
polp-configuration-guide.pdf
installationguide/
6 pages
lepide-dsp-installation-and-prerequisites-guide.pdf
file-server-advanced-configuration-guide.pdf
sharepoint-server-quick-start-guide.pdf
universal-auditing-configuration-guide.pdf
ladss-installation-configuration-guide.pdf
uninstallation-ldsp.pdf
tutorials/
18 pages
How Can I Use Lepide To Help With Password Resets And Active Directory Self-Service
Tutorials and Training for Lepide Data Security Platform
Tutorial - Getting Started with Lepide Data Security Platform
Tutorial - Configuring Lepide DSP for AD/GP/Exchange Auditing
Tutorial - Configure Lepide DSP for File Server Auditing
How To Use Lepide To Audit Office 365
How To Track How Users Are Interacting With Sensitive Data
How To Use Lepide To Implement Least Privilege
How To Reduce False Positives In Data Classification With Lepide
How To Automate Threat Response Using Lepide Data Security Platform
How To Use Threshold Alerting To Detect Threats
How to Use Lepide To Help Locate and Classify Sensitive Data
How to Use Lepide to Track the Source of Account Lockouts
How to Use Lepide To Track Logon And Logoff Activity
Using Lepide To Detect And Respond To Users With Passwords That Never Expire
How to Use Lepide to Track Inactive User Accounts
How Can I Use Lepide to Keep Track of File and Folder Activity
What Changes Can Lepide Track in Active Directory
quick-start-guide/
1 page
google-workspace-quick-start-guide.pdf
infographics/
12 pages
Infographics about IT Audit, Compliance and Security from Lepide
How Can Lepide Help Your Organization Detect Insider Threats and Prevent Data Breaches
2018 Q2 Healthcare Data Breaches
Infographic - What can you do if are the victim of a Ransomware attack
Infographic - Is Your Business Prepared for the Forthcoming GDPR
Infographic - Reacting to Ransomware Attacks Like ‘Petya’
Three Reasons - Why Change Control Is Important for Organizations – Infographic
What you need to know to secure your Active Directory environment
How to delegate privileges to users whilst maintaining the security of Active Directory
How to avoid privilege abuse in Active Directory to ensure security
8 critical flaws in auditing your IT Infrastructure natively
Infographic - List of Most Powerful Audit Reports in Lepide Data Security Platform
whatsnew/
1 page
whatsnew-auditorsuite16.4.pdf
1
2