Tag: Malicious activity
October 18, 2016 |
User Behavior Analytics: Best Practices You Should Start Now
User Behavior Analytics (UBA) enhances security by detecting insider threats and abnormal activity that traditional perimeter defenses often miss. Effective implementation requires collecting logs and activity data across critical systems, integrating with other monitoring tools, and enforcing...
June 3, 2016 |
6 Tools to Protect Your Domain Controllers
There are many things that you can do as an administrator to reduce or eliminate risks associated with your Domain Controllers. In this article, we’ll take a look at some tools you can employ to help with this.
Attack Surface – This concept refers to software, protocols and ports are used...
September 22, 2015 |
Tracking Malicious Windows Server Events with PowerShell
Windows servers can potentially generate thousands—or even hundreds of thousands—of events daily. Most are created from perfectly safe events that system administrators use to get a glimpse of what’s going on. An event might be generated to indicate a disk is running out of free space, an...