logo

Ten Simple Ways to Prevent Security Breaches in Microsoft Exchange 2010

Exchange data is the heart of any enterprise and is considered to be a critical business application, because it is used for record keeping and as a low-cost communication solution. Today, e-mails are not just accessible from the workstation within the corporate network; they can also be accessed from remote computers or mobile devices. This … Continued

Can SIEM Solutions Be Effectively Used for Change Auditing?

This should be no revelation to IT professionals: you have to regularly monitor changes occurring in your network – and mainly for two reasons. The first one is this: continuous monitoring will take pain off meeting compliance requirements and surviving auditor’s visits. The second reason to implement a solution that keeps track of the changes … Continued

Unauthorized Software Installation on Windows Server – Who? What? When?

Suspicious software on your Windows Server may be the result of an unauthorized installation by your own employee or originate from a hackers’ attack. Any suspicious software can potentially cause leakage of sensitive data, not to mention server performance slowdown or infringement of compliance policies. That is why it is vital to be aware of … Continued

Shellshock Survival Guide

In the past few months you might have heard news of cyber-attacks resulting in security breaches almost on a daily basis. HIPAA and PCI compliance violations, hacker intrusions and internal negligence were the top reasons for that. Probably, the most violent and massive of recent breaches was the Shellshock (Bashdoor) vulnerability. It has hit most … Continued

Ten Simple Ways to Prevent Security Breaches in Active Directory

Any IT organization is liable to security threats; however, they can be prevented if appropriate policies, processes and controls are implemented. “Better safe than sorry” applies to this situation perfectly. It is better to secure your infrastructure from being compromised than counting losses after a leakage. Active Directory is at risk in many different ways: … Continued

How to Detect User Account Changes in Active Directory

Tracking user account changes in Active Directory is primarily important from compliance and security-related considerations and also for operational efficiency purposes. Inactive user accounts or a large number of new accounts with extended permissions, disabled or suspiciously modified user accounts – all these issues may impact productivity and network security, not to mention that this … Continued

Shellshock Demands a Managed Response

Shellshock is the latest and possibly most significant IT security vulnerability identified by researchers. I imagine that by now most IT pros have heard of this threat. In a year of unprecedented security events, some may be “tuning out” security. If ever there was an IT vulnerability to not minimize, it’s Shellshock. Heartbleed, a massive … Continued

Understanding the Mailbox Move Request in Exchange 2010

Mailbox Move Request is the process of moving a mailbox from its source mailbox database to a target mailbox database. Target mailbox database can be either on the same server or on a different server or even in a different domain/forest.  Mailboxes are moved for various reasons like transitioning to the new environment or investigating … Continued

Exploring Exchange 2010 Role Requirements Calculator – DAG Scripts

Microsoft Exchange 2010 Role Requirements Calculator is de facto a tool to calculate and design Exchange 2010 solution for the production environment. It’s a Microsoft best practice tool created using Excel application for easy usage and distribution, and it can be downloaded from Microsoft TechNet Gallery. Administrator has to key in all the necessary design … Continued

5 Reasons to Reassess Your IT Security Strategy

If you’ve been in the IT field for a while, you know that one thing you can depend on is that you can’t depend on anything to stay the same. Technology is always advancing, trends are always changing, and you’re often left scrambling to keep up. Nowhere is this more true than in the security … Continued