16 May, 2016 | Russell Smith

4 Steps to a Secure Active Directory Administration Model

Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator...
5 December, 2013 | Nick Cavalancia

Can the NSA Spot the "Adversary"?

The NSA released a PDF entitled "Spotting the Adversary with Windows Event Log Monitoring" earlier this year. While there's a bit of irony in this, given the whole Snowden story that followed the release of this document, the PDF is still chock full of great information on what to watch for in an...
3 December, 2013 | Nick Cavalancia

Windows IT Pro Community Chooses Netwrix Auditor!

  Last week Windows IT Pro, a well-known on-line publication for IT professionals, announced the results of their annual Community Choice Awards. Netwrix Auditor, our flagship product, received two Gold Awards this year and was named the Best Auditing/Compliance Product and Best Active...
18 October, 2013 | Deb Shinder

Top 6 Security Breaches that Auditing Would have Prevented

Because IT security breaches have become so prevalent, the common model for addressing them is often more reactive than proactive. Have you given up and given in to the idea that breaches are inevitable? Money, time and effort is put into establishing incident response teams, but often preventative...
10 October, 2013 | Jeff Melnick

Live Webinar That Every IT Pro Should Attend

Date: Thursday, October 17, 2013 Time: 2:00 PM EDT Auditing Group Policy Changes: What you DON'T know CAN hurt you! Like just about every AD shop, you rely on Group Policy to ensure a secure and productive working environment for your users. You rely on it so much that you probably need...
Show more articles