23 August, 2018 | Ryan Brooks

SysAdmin Magazine: Hardening Windows Server Security

It’s time to face a harsh truth of IT life: Your network is almost certainly going to be breached. Best practices now recommend adopting an "assume breach" strategy for as the way to reduce security risks to your environment. According,  the August edition of SysAdmin Magazine focuses on Windows...
23 August, 2018 | Jeff Melnick

Auditing Windows Systems

Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing...
24 August, 2017 | Russell Smith

File and Folder Auditing on Windows Server 2003 and 2008

Auditing files and folders got much easier with Global Object Access auditing in Windows Server 2008 R2 and Windows 7. However, if your organization is still running Windows Server 2008, or earlier, for instance Windows Server 2003, setting up file and folder auditing will be a little more...
7 May, 2014 | Richard Muniz

Will the Guilty Party Please Stand Up!

Today we are going to talk about finding “lost” files with File Server auditing. But first, how many of you are aware that users have a lot in common with a five year old? Now, before I start getting hate mail, before folks start driving by my house and shooting at it (warning, I shoot back)...
11 November, 2013 | Nick Cavalancia

Best Practices for Change Management in the Data Center

When it comes to change management, Scott Matteson gets it.  Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of individual accounts to perform changes so that Auditing of system changes can easily be tied back to...
7 November, 2013 | Nick Cavalancia

Death by Event Log Overload

When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs. So, if companies today already have all necessary data that points...
18 October, 2013 | Deb Shinder

Top 6 Security Breaches that Auditing Would have Prevented

Because IT security breaches have become so prevalent, the common model for addressing them is often more reactive than proactive. Have you given up and given in to the idea that breaches are inevitable? Money, time and effort is put into establishing incident response teams, but often preventative...
19 August, 2013 | Jeff Melnick

Free Cheat Sheet on File Server Auditing

Our next FREE cheat sheet is devoted to auditing changes in the File Server. In this quick guide you'll find the information about required system configurations, HOW-TOs and event IDs that could be helpfull you when auditing your File Servers. Click here to download this FREE guide, no...
Show more articles
...