Netwrix Auditor – Data Discovery & Classification Edition is out! Learn More
26 December, 2017 | Russell Smith

Secure Privileged Access with ESAE Model

Ensuring that systems are patched and that defense-in-depth security protections are working effectively, top the list of concerns for IT departments. But despite these efforts, security breaches are still on the rise because operational issues are commonly ignored. Best practice dictates that...
18 August, 2017 | Oleg Lalaev

Top 5 Free Tools for NTFS Permissions Reporting

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few free tools that will help you save time on this report generation and export all permissions granted to a user account on a file share...
26 April, 2017 | Larry Glusman

RemoteApp: Remote Access Tool to Simplify a Sysadmin Life

What is RemoteApp? Are you using your Terminal Server/RDS Server for one main application? A database or ERP program, perhaps? If so, you are a prime candidate for RemoteApp, a remote access tool introduced by Microsoft for Server 2008 R2. However, many people who are using Terminal Server/RDS...
4 August, 2016 | Russell Smith

Tips to Improve Privileged Accounts Security

In this article, I’ll take a look at how Privileged Access Management (PAM) in Windows Server 2016 enables Just-In-Time (JIT) Administration, helping to secure privileged user accounts. It seems like a problem as old as computing itself, or, depending on your point of view, just a minor matter...
23 March, 2016 | Jeff Melnick

How to Detect Who Deleted a Group Policy Object

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to...
Show more articles