Audit Domain Group Changes Using Event Log Subscription

Many IT folks like the “Do-it-Yourself” approach to solving many tasks. This article written by Chris Colorado provides some very detailed instructions on how to setup Active Directory Auditing of not just one DC, but (in theory) all of them, centrally. The method described utilizes Event Log data.  Another method involves Monitoring via PowerShell. But … Continued

It’s Never Too Late to be Compliant

September 23, 2013 was a deadline for all medical industry contractors and vendors to comply with HIPAA omnibus rule. This applies to all companies that touched sensitive patient information such as law firms, accountants, data analytics, and other health IT companies that serve the healthcare industry. According to the new rules the companies that are … Continued

Next Generation Of SIEMs? Ease Of Use, Analyze More Data

In one of the most recent articles posted on darkreading.com, Robert Lemans speaks about the new features of Security Information and Event Management (SIEM) systems and some common problems the comapnies face when using them. The most interesting quote in this article came as no surprise – “Yet SIEM deployments are difficult. The complexity of … Continued

Redmond Magazine Reviews Netwrix Auditor 5.0

Redmond Magazine has conducted  a product review of Netwrix Auditor. Our flagship solution for configuration auditing of IT systems received an exceptional rating of 9.2 out of 10. None of Netwrix Auditor’s competitors received such a high score. According to Redmond Magazine, Netwrix Auditor best fits the organizations “that want a single tool for a wide … Continued

Top 6 Security Breaches that Auditing Would have Prevented

Because IT security breaches have become so prevalent, the common model for addressing them is often more reactive than proactive. Have you given up and given in to the idea that breaches are inevitable? Money, time and effort is put into establishing incident response teams, but often preventative efforts don’t go much further than applying … Continued

Keeping Your Security in a “Known State”

Cicso’s recently published the results of  a survey of Public Sector CIOs showing a surge in intent to allocate budget for security in 2014. This comes as no surprise, given the rise in both external and internal threats to organizations. As part of an overall security strategy, organizations need to constantly assess the ever-changing state … Continued

Live Webinar That Every IT Pro Should Attend

Date: Thursday, October 17, 2013 Time: 2:00 PM EDT Auditing Group Policy Changes: What you DON’T know CAN hurt you! Like just about every AD shop, you rely on Group Policy to ensure a secure and productive working environment for your users. You rely on it so much that you probably need multiple people managing … Continued

The State of Active Directory Auditing 2013

It’s a never–ending problem: if you have more than one person managing Active Directory, you’ll eventually find yourself in a situation where AD isn’t configured the way you expected and you have no idea how you got there. We held a survey as part of our recent webinar, “Making Your Active Directory Life Easy” in … Continued