A monthly curation of our best stories.
We show only what you need.

Thanks for subscribing! Our best news and stories will be dropped in your inbox every month.

  • Please enter a business email id
    By clicking 'Subscribe', you agree to processing of personal data according to the
    Privacy Policy.
  • 2020
  • 2021
  • 2022
  • 2023
  • July 2023

    Stories for you

    Level up your organization's access control policies

    Effective access control policies that ensure data security, and secure access to the organization's network and resources are imperative. Here's how you can create one.

    Level up

    Role of machine Identity Management in today's identity security

    Machine identities now outnumber human identities and hold access to sensitive data, making machine identity management imperative to ensure identity security.

    Explore here

    Emphasis on cryptocurrencies and crypto wallet security attacks

    As blockchain-based transactions go mainstream, they are subject to financial crimes. Take a look at the different forms of crypto cyberattacks, and how you can prevent them.

    Here’s how

    Cut repetitive tasks, streamline Identity security

    On July 31st, join the webinar to understand why organizations must reduce redundant IT tasks to uplift their security posture, and how ManageEngine's AD360 is the go-to IAM solution to resolve this challenge.

    Register now

    Eliminate AD user management hassles

    Learn to streamline bulk user management, remove stale accounts, supervise AD activities with templates and workflows, and best practices for smoother identity lifecycle management.

    Watch the webinar
  • June 2023

    Stories for you

    Why healthcare organizations need modern IAM solutions

    Rapid adoption of cloud technology enables healthcare industries to provide timely care without the need for specific facilities. However, this progress puts the industry in the cross-hair of cyber-criminals. Outdated IAM solutions will no longer be sufficient.

    So how to safeguard?

    AI TRiSM explained

    Governments and corporations all over the world are pushing for AI regulation. In such times, AI TRiSM, a Gartner proposed framework, comes across as a necessary step towards achieving secure, humane, and most importantly, trustworthy AI.

    Explore AI TRiSM

    NIST SP 800-171 for protecting Controlled Unclassified Information

    Discover NIST SP 800-171, your key to safeguarding Controlled Unclassified Information. Explore its evolution, uncover the consequences of non-compliance with federal data regulations and learn who is affected by NIST SP 800-171.

    Secure your information today!

    Secure hybrid IT environments with CISA's 2023 guidelines

    If your organization is currently looking to deploy hybrid IT, or is already operating in one, you must be aware of its security and operational gaps. Learn how to mitigate these challenges, in adherence to CISA's SCuBA guidelines.

    Fortify your hybrid IT

    Data compliance cheat sheet

    Here's a one-stop cheat sheet with consolidated information on the mandates and applicability of the laws in various regions. Simply click the regions you wish or where you operate and look at the laws that apply in that region.

    Get your cheat sheets
  • May 2023

    Stories for you

    Looking to deploy Zero Trust? Start with the DoD's latest framework.

    The Department of Defense (DoD) rolled out its latest Zero Trust framework, and plans to implement it by 2027. Join me to learn how you can use this comprehensive roadmap to kickstart your organization's Zero Trust journey.

    Reserve my spot

    Implementing contextual awareness to render dynamic security decisions

    What's needed is a cybersecurity system that's as dynamic as the threat landscape and that leverages the power of contextual awareness to make intelligent decisions.

    Read on

    The role of machine identity management in today's identity security

    Unlike human identities, machine IDs come in the form of cryptographic keys, digital certificates, and other secrets. Okay, but why is it necessary and how does it work?

    Know here

    How to mitigate common application security vulnerabilities

    Application security vulnerabilities refer to any weakness, or a system flaw in an application that can be exploited to trigger a security breach.

    Mitigate vulnerabilities

    Ensure 5G security with Zero Trust architecture

    5G is designed to manage multiple device types and high-bandwidth applications including 4K and 8K video streaming, massive machine type communication, and ultra-reliable low latency communications.

    So why Zero Trust?
  • April 2023

    Stories for you

    Reinforcing blockchain privacy with zero-knowledge proof

    Zero-knowledge proof (ZKP) is cryptography-based authentication technique that ensures enhanced privacy, breach prevention and cybersecurity in blockchain transactions.

    Explore ZKP

    Rise in adoption of managed security services

    Third-party vendors such as Managed Security Service Providers ensure the cybersecurity of a distributed workforce, as businesses shift to hybrid environments.

    Read more

    Why cybersecurity must start from hardware design

    To minimize the organizational attack surface, cybersecurity should not just be a software-centric concept, it must also start on a hardware level.

    Minimize attack surface

    Organizations must prioritize cyber insurance. Here's why

    Cybercrimes prove costly for organizations. To reduce the financial impact, it is essential for businesses to prioritize and avail cyber insurance cover.

    Know why

    Quantum Resistant Ledger: A quantum-proof blockchain frontier

    Quantum Resistant Ledger (QRL) is the first industrial implementation of quantum-proof cryptographic blockchain technology. QRL is capable of securing stored digital assets against cyberattacks.

    Know more about QRL
  • March 2023

    Stories for you

    A sysadmin's survival guide for endpoint security in 2023

    Sixty-eight percent of organizations have suffered endpoint attacks that compromised their data. Implement CISA and NIST SP 800-63B best practices to mitigate endpoint risks.

    Secure your endpoints

    Cryptojacking: A silent attacker in the world of crypto crime

    The wider acceptance of crypto assets has also led to the use of cryptojacking attacks, which allows attackers to exploit the victim's computing devices to mine crytocurrencies.

    Protect your assets

    Pharming vs phishing : Which is the real scamdemic?

    Social engineering based cyberattacks have increased during the pandemic, especially pharming and phishing. These attacks can inflict huge financial losses upon its victims.

    Explore on scamdemic

    What is ITDR, and how does it elevate cybersecurity?

    Identity threat detection and response (ITDR) combats identity theft and other cyberthreats by ensuring complete visibility into organizations' hybrid environments.

    More on ITDR

    Is MFA the gateway to a passwordless future?

    Multi-factor authentication (MFA) helps users lessen their dependence on passwords, but that alone may not be enough to ensure a passwordless journey.

    To passwordless journey
  • February 2023

    Stories for you

    Mitigate cybersecurity burnout, elevate IT performance

    IT teams regularly face the risk of performing repetitive, and time-consuming tasks at higher volumes, especially when organizations witness churn. This can lead to cybersecurity burnout, which cause operational fatigue and stress and increases chance of human errors.

    Read more

    Reducing cybersecurity debt with IGA

    Avoiding cybersecurity debt should be the number-one priority for organizations, as it can have costly repercussions. To do this, organizations must focus on establishing an identity-based security strategy, which can be done with the help of IGA.

    Watch now

    Extending Zero Trust to APIs

    There are many loopholes in the security monitoring radar that can be exploited. With APIs becoming attractive targets for threat actors, learn how extending Zero Trust to APIs can help you defend against these sophisticated attacks.

    Learn how

    Why software supply chain needs a Zero Trust approach

    Cloud-based platforms and services, provided by third-party vendors raises a serious concern of dependency issues within an organization. Which is why, supply chain vendors are becoming a leading target for attackers. Discover why Zero Trust is the best way to defend against supply chain attacks.

    Discover why

    Data fabric for hyper-contextual cybersecurity

    Are your data science tools flexible enough to derive comprehensive results given the rising number of connected devices? To protect networks, cybersecurity must use data fabric to receive dynamic analyses and context about endpoints and adversaries, instead of relying on monolithic data silos.

    Explore here
  • January 2023

    Stories for you

    Active Directory LDAP Field – Attribute Mappings

    The user friendly input fields from MS ADUC (Active Directory Users and Computers) are mapped to the LDAP (Lightweight Directory Access Protocol) attributes. This article brings you a cheat-sheet with all the mapping both visually and tabular.

    Get your cheat-sheet

    How to change the IP address of a domain controller

    The DC’s address is statically assigned to the server. However, you might be required to change the DC’s IP address at times. Read on from the link to know more.

    Know more

    Desktop shortcuts using AD Group Policy: The complete guide

    This article brings you some of the important benefits of using GPOs to configure shortcuts on user desktops like deploying shortcuts to apps, links, file objects, and shell objects and more.

    Learn more

    Resources for you

    9 IAM challenges in education and how to solve them

    User provisioning, access management, and data protection can be challenging tasks. With effective IAM capabilities, you can prevent poor onboarding experiences and ensure data security.

    Get started

    5 IGA essentials to ensure security and compliance in your organization

    This e-book will outline five identity governance and administration (IGA) essentials every organization needs to manage identities and circumvent identity-related attacks.

    Get your e-book

    5 IGA essentials to foolproof your enterprise security

    This webinar brings you all that you need to know about the rise in identity-based cyberattacks, an overview of Identity-based security, IGA fundamentals and more.

    Go to Webinar
  • December 2020

    Stories for you

    We're making it easier for you to receive only the information you need

    As we're offering year-end deals on our solutions, we're making it easier for you to know the details. Just click the link below to select the products you're interested in, and we'll send you only the details you need.

    Update your preference

    Enhancing your defenses against critical data loss

    Protecting critical data from falling into the wrong hands is harder than ever. This e-book helps IT admins curb threats to sensitive date.

    Download your copy

    3 simple ways to drastically cut down Active Directory administration costs

    Using native Active Directory tools to tackle today's IAM challenges is ineffective and puts an undue strain on your organization's IT budgets. Our e-book shows you how you can avoid it.

    Read e-book

    CISAs recommendations to recognize and avoid email scams

    Email borne cyberattacks are growing rampant due to remote work. Read our e-book and learn more about what they are, how they work, and what you can do to avoid them.

    Get your e-book

    Webinars on-demand

    Building a cybersecurity strategy that's resilient to remote-work challenges

    Learn from IAM thought leaders about how to build a cybersecurity strategy that withstands remote work challenges. MartinKuppinger, principal analyst at KuppingerCole, and Jay Reddy, senior technical evangelist at ManageEngine, share their tips.

    Watch the webinar
  • November 2020

    Stories for you

    A complete guide to HIPAA-NIST compliance crosswalk

    Implementing HIPAA security rules can be challenging. Read our e-book to know how HIPAA security rules can be better implemented by following the NIST Cybersecurity Framework.

    Download your copy

    Data security best practices for remote workers

    Remote working makes your network more vulnerable to attacks. Here is an admin's guidebook to the best practices you can follow

    Get your guide

    Zero Trust leads the way to remote work security

    Enforce access control and eliminate unauthorized access to data and resources. Learn the 6 action-steps of Zero Trust implementation to get a bird's eye view of your network.

    Download e-book

    Webinars on-demand

    A 5-step action plan for threat detection using user logon activity

    How can you use user logon activity to spot security threats in your network? What are the logon patterns that indicate a breach. Our expert answers these questions and much more in the webinar.

    Watch webinar video
  • October 2020

    Stories for you

    Perfecting your remote data security strategy

    Here are 5 easy-to-implement data security best practices that will help keep your critical data secure.

    Get your copy

    A definitive guide to fortifying critical PHI

    Backing up PHI is no easy task. Learn the best practices to secure electronic health records, prevent data loss, and meet compliance regulation.

    Download your PHI guide

    Avoid anomalies in email activity go unnoticed

    Learn how to detect and mitigate anomalies before they snowball into a huge data breach.

    Download Guide

    Overcome native limitations in SharePoint backup and recovery

    Learn about the limitations of native SharePoint tools for backup and restoration, and techniques to overcome these limitations.

    Download your copy

    Webinars on-demand

    5 points to consider while reviewing your disaster recovery plan

    What factors will help you decide which data to backup? Will the 3-2-1 backup plan work for all organizations? What goes into an effective DRP ? Our expert answers these questions and much more in the webinar.

    Watch the webinar

    Building a warning system to spot insider threats

    A recent Ponemon Institute study revealed that insider threats have gone up by 47%. Watch how you can create early warning systems to identify such business-crippling insider threats.

    Watch webinar video
  • September 2020

    Stories for you

    4 key cybersecurity monitoring pillars that check every box

    To ensure your organization checks all the necessary boxes to have a strong cybersecurity framework, here are four key cybersecurity monitoring pillars that you can follow. Verify your safety now

    Download your copy

    5 pain points in Active Directory user account management

    If you're spending too much time and resources to manage Active Directory (AD) user accounts, learn how you can overcome 5 common pain points in Active Directory user management.

    Read e-book

    Remediating the gaps in your anti-ransomware strategy

    Discover the pitfalls in your defense against ransomware, and eliminate them with our 3-step strategy. Learn how you can detect threats and stay resilient to ransomware attacks.

    Get the guide

    Weekly podcasts with topics chosen by you

    We've had many people suggest that we start a podcast tailor-made for our audience. So, we're launching our new podcast this month, Identitude, and we want you to choose what we talk about.

    Choose the topic you want

    Webinars on-demand

    Password management practices to plug remote work's loopholes

    With remote working having its fair share of security gaps, we show you password management practices that you can implement so that those loopholes aren't another burden.


    A 5-step plan for effective data protection

    Protecting data from hackers is challenging. Join the discussion with our cybersecurity guru to learn his five step plan to fortify critical data and steer clear of hefty fines.


    Aligning your SIEM framework with NIST guidelines

    Our SIEM expert shows you how attackers compromise your organization's security, the tactics they use, and how you can defend against them by adhering to NIST guidelines.


    Is Zero Trust model your redemption to COVID themed attacks?

    Disappearing network perimeter is no illusion. Cybercriminals are taking advantage. Let's talk NIST recommended Zero Trust security framework for the new normal.

  • August 2020

    Stories for you

    How healthcare organizations fortify critical PHI from hackers

    Healthcare IT leaders are tasked with ensuring patient data integrity, submitting to compliance, and mitigating insider risks. Learn how healthcare delivery can be made more secure.

    Learn how

    What the FBI recommends to prevent BEC attacks

    Learn about the anatomy of BEC scams, some recent cases of successful attacks, and how you can steer clear of such scams with timely detection and proactive countermeasures.

    Get your copy

    Streamlining your disaster recovery plan

    Implementing a disaster management plan is no small feat. Learn the key components of a disaster recovery plan, and how you can streamline the process.

    Take a look

    Webinars on-demand

    The NIST Cybersecurity Framework: 5 core functions and how you can align with them

    According to Gartner, the NIST Cybersecurity Framework (CSF) will be adopted by 50% of US organizations by the end of 2020. Find out how you can align with the core functions of the NIST CSF.

    Register now

    Countering ransomware: A 5-step action plan towards threat detection, backup, and recovery

    If you are attacked by ransomware today, could you recover critical data without compromise? We discuss how organizations can strengthen their front-line of defense against ransomware.

    Book your slot now

    5 steps to perform risk assessment in your network

    The first step to building an efficient security strategy is to perform a risk assessment. Join our IT security expert as he helps you perform an extensive assessment in your network.

    Grab a seat now
  • December 2021

    Stories for you

    How to evaluate a password management solution for 2022?

    Not every IAM solution is equipped to tackle the password management challenges of today's mobile workforce. Our guide explains how you can evaluate these solutions, and how ManageEngine's ADSelfService Plus can help your organization tackle 2022's password management and security challenges.

    Read now

    Looking back at ADAudit Plus in 2021

    2021 was a good year for ADAudit Plus as it rolled out an array of new auditing capabilities, features, and enhancements. Here's a roundup of the new updates and improvements we have delivered this year.

    Let's recap

    The Microsoft 365 administration tool every admin needs

    Microsoft 365 continues to be the most commonly chosen cloud-based work suite that helps simplify collaboration and communication. However, it falls short of features for IT administrators. This is where ManageEngine's M365 Manager Plus comes in. See how the solution can eliminate the administrative burden for IT admins.

    Take a look

    Webinars for you

    Simplifying password management challenges in 2022

    With hybrid and mobile workforce being the norm, password management and security become more challenging. Our masterclass, designed with this in mind, helps you understand and navigate these modern day challenges using ManageEngine's password management solution.

    Reserve your seat

    5 steps to secure your Active Directory

    It is an indisputable fact that Active Directory plays a critical role in the IAM and security operations of any organization, making it a prime target for attackers. An attack on AD can be devastating - especially in the current hybrid work scenario. Learn how to secure your AD in 5 crucial steps.

    Watch now
  • November 2021

    Stories for you

    Your one-stop guide to all things AD360, our IAM solution

    AD360 is your one-stop solution for hybrid workforce enablement, password self-service, automated lifecycle and access management, advanced MFA, secure SSO, compliance reporting and change auditing, and Zero Trust implementation. Learn how AD360 can help you implement these critical IAM capabilities in your organization.

    Read now

    3 must-dos for IT admins in healthcare organizations to secure PHI

    Ensure the integrity of protected health information (PHI) by incorporating these three strategies and ensure compliance with medical information privacy and security regulations like HIPAA and HITRUST.

    Read now

    Webinars for you

    2022's top IAM challenges and simplifying them with ManageEngine

    Join our masterclass that is designed to help you equip yourself to tackle the IAM and IT security challenges of next year. It also helps you understand the key capabilities to look for while evaluating an IAM solution.

    Reserve your seat

    Transforming cloud security with SASE

    With employees working remotely, security solutions must extend beyond corporate perimeters. SASE converges network and security functions into a single cloud-based framework. Learn more about SASE in this webinar.

    Watch now

    Redefine hybrid workforce security with Zero Trust and SASE

    Hybrid work is an undeniable reality, and the stakes are raised with people working from anywhere. Now is the time to revise your IAM framework. Learn how adopting Zero Trust and SASE can keep you out of harm's way.

    Watch now
  • October 2021

    Heads up!

    We're currently running year-end offers on our solutions*

    If you were having an eye on one or more of ManageEngine's solutions, now would be the right time to dive in! We're running offers on our solutions for a limited time. If you would like to avail the offers, all you have to do is let us know that you're interested.

    I'm interested

    *This offer is valid until 31st December, 2021 only. Please note that this offer is applicable only for direct new purchases from ManageEngine and is not applicable on renewals and upgrades.

    Stories for you

    Check your security score with ADManager Plus

    With ADManager Plus build 7116 and above, you can check if your product is configured securely and reduce security risks in your environment.

    Learn more

    How ransomware attacks weaponize Active Directory

    Many recent ransomware attacks have exploited Active Directory. We describe the tactics used by the threat actors and explain preemptive defense measures you should adopt.

    Read now

    Zero-trust #101: Here's everything you need to know

    Today, anybody can be a malicious threat actor. So, how do you defend your organization? That's where the zero-trust security standard comes into play. Learn more about its components and best practices, and keep your organization safe and secure.

    Learn more

    Webinars for you

    [Webinar] 5 tactics to make it hard for attackers to exploit Active Directory

    When you bolster Active Directory (AD) security, you impede four key stages of any cyberattack. In our upcoming webinar, we explain how AD is abused in these stages and discuss five defense tactics to protect your AD from attacks.

    Save your spot
  • September 2021

    Fresh in the news

    Stolen credentials lead to data theft at the UN

    Threat actors leveraged the stolen credentials of a UN employee to gain access to a proprietary project management software. Learn more about this data theft and how a basic security measure could've prevented the attack.

    Read now

    Stories for you

    The California Privacy Rights Act: Getting ready for CCPA 2.0

    The California Privacy Rights Act (CPRA) will take effect from January 1, 2023. However, information collected from as early as January 1, 2022 will come under the scrutiny of the CPRA. Learn how you can stay compliant.

    Get the guide

    Defend against brute-force attacks powering ransomware

    Learn how attackers have been leveraging RDP brute-force attacks to spearhead ransomware campaigns in the pandemic, the tools they use, and five steps you can take to thwart their efforts.

    Read now

    Brush up your basics on Active Directory Users and Computers snap-in

    Active Directory Users & Computers snap-in is the go to tool for administrators to carry out day-to-day activities. Learn how you can simplify your administrative burden and make AD management more efficient.

    Level Up Now

    Moving Active Directory Users and Computers from one domain to another: Best Practices

    Migrating users and computers from one domain to another can be quite tricky, especially when the settings of these objects have to be preserved. Our guide details how you can go about migrating AD objects with PowerShell and Native Windows tools.

    Read now
  • August 2021

    Trending news

    Microsoft confirms another 0-day vulnerability in Print Spooler

    Microsoft released an advisory for a new vulnerability in the Windows Print Spooler service. This vulnerability allows local attackers to gain access to system privileges.

    Watch video

    Stories for you

    Weak passwords can wreck your AD. Find and eliminate them now

    Weak passwords are an open invitation for hackers to exploit user accounts. Find the users with weak passwords and force them to change their passwords the next time they log on.

    Eliminate weak passwords

    Wrong Access Control Entries (ACE) can compromise your data

    ACEs dictate access permissions that secure AD objects from critical data exposure. But wrong ordering of ACEs can have devastating consequences. Learn how to get the ACEs right and secure your organization.

    Get your access permissions right

    3 things to do before raising your AD forest functional level

    Raising your forest functional level gives you access to new and improved AD DS functionalities. There are certain things to take care of before raising the functional level so that all systems remain functional.

    Ensure a smooth upgrade

    Cybersecurity hack: Combining threat intelligence with UEBA

    Combining threat intelligence with user and entity behavior analytics (UEBA) is effective in combating external attacks as well as internal threats. Learn how you can implement capabilities in your organization.

    Learn the hack

    Webinars for you:

    Lessons from high-profile Active Directory breaches

    Learn how AD was compromised in recent high-profile attacks including the SolarWinds supply chain attack and the Colonial Pipeline ransomware attack, and what defense measures you should adopt.

    Register now
  • July 2021

    Stories for you

    PowerShell: How to Find Password Expiration Date for AD Users

    As a system administrator, you will need to keep track of all user accounts and their expiration dates to prevent users from getting locked out. However, in a large organization, it is easier said than done. Use our PowerShell script to get a list of all user accounts along with when their passwords will expire.

    Ready-to-use PowerShell script

    Perform Active Directory environment clean-up with PowerShell

    An empty AD group can contain certain permissions and access rights. Such groups are often not monitored or accounted for leaving them potential to cyberattacks. The following PowerShell script will help spot empty groups and automatically delete them.

    Get your script

    Controlling USB access on select devices using GPO

    USB devices have become an indispensable way to store data. But, due to the IT security threat they pose, admins block the use of USB devices on their computers. Learn how to do so with the help of GPO's.

    Learn how

    Learn about Active Directory replication in a nutshell

    In any organization, large or small, it is imperative that directory data is regularly updated and available for access to all users. Learn the mechanisms that contribute to the Active Directory replication model.

    Find out how

    Webinars for you:

    How to mitigate against zero-day vulnerabilities

    The recent Proxylogon vulnerabilities in Microsoft's Exchange servers show how easily organizations can be compromised. We dive into the process of these attacks and see how you can keep your organization secure from such zero-day vulnerabilities.

    Save your spot

    European Union recommendations to prevent cyberattacks on SMEs

    Learn about the five most common cybersecurity challenges SMEs currently face, and how you can overcome them using the The European Union Agency for Cybersecurity's best practices recommendations.

    Register now
  • June 2021

    Stories for you

    Automate access management with risk-based contextual authentication

    When security measures like MFA are implemented enterprise-wide, end-users are subjected to increased user-friction. Learn how to avoid unnecessarily stringent measures and apply access policies based on risk-factors and context.

    Implement conditional access now

    Manage resource-intensive processes and enhance end-user UX

    Heavy hardware resource utilization on end-user machines will lead to reduced productivity by hindering users from getting their job done. This PowerShell script helps admins manage and kill memory-hogging processes.

    Get your script

    Notify users before their password expires, for free

    Enforcing regular password changes is a widely followed security practice. However, if end users miss, or ignore password expiring reminders, they end up locked out of their accounts and your help-desk is flooded with calls. Send account expiration reminders to users via SMS and email notifications with our free tool.

    Reduce account lockouts now

    Breeze through troubleshooting with Windows Logs

    As an administrator, security logs are the first place to look at to troubleshoot system problems and spot unauthorized access attempts. However, stifling through of system log information is laborious. Use our PowerShell script to get the most recent error messages in the system logs.

    Ready-to-use PowerShell script

    Webinars on-demand

    [On-demand] Applying the cyber kill chain framework to identify and combat cyberattacks

    Understanding the cyber-attack chain model can help you put in place strategies to “kill” or contain the attack at various stages. Watch my webinar to protect your IT ecosystem from pesky attackers.

    Watch video

    [Live] The NIST Cybersecurity Framework: 5 core functions and how you can align with them

    According to Gartner, the NIST Cybersecurity Framework (CSF) will be adopted by 50% of US organizations by the end of 2020. Find out how you can align with the core functions of the NIST CSF.

    Reserve your spot
  • May 2021

    Stories for you

    Understanding and mitigating Exchange zero-day vulnerability exploits

    We take a deep dive into how attackers exploited the zero-day vulnerabilities in Microsoft's Exchange servers, mitigating the vulnerabilities in your organization, and performing damage control and threat analysis if your organization has been compromised.

    Get your e-book copy

    A step-by-step guide to raise forest functional levels

    An Active Directory functional level determines what capabilities of Active Directory Domain Services are available for a particular forest or domain. Learn all there is to know about raising forest functional levels, and the best practices that are to be adopted while raising them.

    Level up now

    Struggling to add attributes to your Global Catalog Replication set?

    It is common to notice that few Active Directory attributes are not natively present in the global catalog replication set. Configure additional attributes to be replicated to the Group Catalog using our ready-to-run PowerShell code.

    Get your PowerShell script

    Leveraging PowerShell as an Active Directory group management tool

    Group management can be quite a challenge for Active Directory administrators day in and day out. We've collated a list of basic PowerShell scripts and commands that admins can use while working with Active Directory groups.

    Get your PowerShell script

    Webinars on-demand

    How to think like an attacker and prevent password attacks

    Password attacks are the go-to strategy for cybercriminals even in 2021. We are going show you how various password attacks are carried out and discuss steps and tools to help you get ahead of attackers.

    Register now
  • April 2021

    Stories for you

    Free tools for efficient Active Directory network management

    Check out our list of free Active Directory (AD) tools that you can use for better AD network management. From a Last Logon Reporter to a DC monitor, we got you covered.

    Get your free AD tools

    Why SMBs should prioritize password management in 2021?

    SMBs can drastically reduce their attack surface if they get password management right. We look at 4 unique password management hurdles SMBs face, and how SMBs can overcome these hurdles.

    Learn more

    Handle AD permissions like a pro

    Get up to speed on Active Directory object permissions and grant access more securely. We look at AD permissions, inheritance, and how permissions can be assigned in AD.

    Level up now

    Are temporary folders getting out of control?

    Temporary folders accumulating over time take up considerable space. Clean up unwanted folder contents with our PowerShell script to delete all the temporary folders contents in a go.

    Get your PowerShell script

    Webinars on-demand

    Top 5 identity and access management challenges of 2021 and how to overcome them

    Predictions by Gartner and Forrester on IT management trends post-COVID-19 show identity management could get more challenging in 2021. Here's how to overcome them.

    Save your spot
  • March 2021

    Stories for you

    5 Active Directory challenges of 2021 and how to overcome them

    Predictions by Gartner and Forrester on IT management trends post-COVID-19 show active directory management could get more challenging in 2021. Here's how to overcome them.

    Simplify AD management

    Reducing account compromises by 99.9% using MFA

    Microsoft says that using multi-factor authentication (MFA) can reduce account compromises in your organization by 99.9%. Know why MFA is effective, and learn the best practices for MFA from our guide.

    Get the guide

    5 best practices to ensure long-term Office 365 security

    As organizations increasingly rely on Office 365 to facilitate remote work for a distributed workforce, IT admins must ensure that their employees can remain productive without increasing cybersecurity risk.

    Secure Office 365

    Webinars on-demand

    The US FCC's cybersecurity recommendations for SMBs in 2021

    Join our webinar to learn all about the cybersecurity best practices recommended for SMBs by government organizations such as the US FCC, UK NCSC, and Australia's ACSC.

    Save your spot

    Manage cybersecurity risks better with the NIST Cybersecurity Framework

    Strengthen your organization's security posture by knowing how to manage cyber security risks better with the help of 5 core functions of the NIST Cybersecurity Framework.

    Watch now
  • February 2021

    Stories for you

    How to strengthen your SIEM framework for 2021

    A 2020 IBM report saying it takes about 280 days to detect a breach shows that traditional SIEM frameworks are no longer strong enough. Learn how you can strengthen your SIEM framework for 2021 using AI, and more.

    Get the guide

    Password security for 2021: 5 essential measures

    81% of data breaches are due to compromised passwords, experts say. To ensure your organization isn't a part of that 81%, we bring you 5 essential password security measures for a secure 2021.

    Learn more

    3 things every SharePoint administrator should monitor

    Any performance hiccup in a SharePoint environment could have major repercussions on business continuity. Here are 3 things every SharePoint administrator should monitor to ensure seamless workflow.

    Download guide

    Webinars on-demand

    Applying the cyber kill chain framework to identify and combat cyberattacks

    Understanding the cyber-attack chain model can help you put in place strategies to “kill” or contain the attack at various stages. Tune in to our live webinar to protect your IT ecosystem better.

    Book your slot

    Maximizing IAM performance with the right metrics

    The performance of your IAM framework hinges not only on the number of tools but also on how well you utilize them. Watch our expert's webinar to learn about an 8-step framework for tracking and measuring crucial IAM metrics.

    Watch webinar
  • January 2021

    Stories for you

    A flexible password framework for your remote workforce

    As workforces are now divided into work-from-home and work-from-office, we created a flexible password framework guide that can keep your organization secure regardless of its workforce type.

    Get your guide

    6 ways to get more out of your SharePoint audit logs

    Using native tools to audit an enterprise level SharePoint environment has its limitations. Read this e-book to know how to overcome them.

    Download e-book

    Remediating the gaps in your anti-ransomware strategy

    If you are attacked by ransomware today, could you recover critical data without compromise? Discover the pitfalls in your defense against ransomware, and eliminate them with our 3-step strategy.

    Get the guide

    6 essential hacks for your IAM program in 2021

    Getting the most of your IAM program or demonstrating its ROI can be quite tedious without metrics. In this e-book, we've put together 6 hacks that'll help you define and measure relevant metrics.

    Read e-book here

    Webinars on-demand

    Is Zero Trust model your redemption to remote work vulnerabilities?

    Trust is a vulnerability where humans are the new perimeter. However, the trust you've not yet established can't be misused. Let's talk NIST recommended Zero Trust security framework.

    Watch now
  • December 2022

    Stories for you

    The state of cybersecurity during mass turnover

    Amidst Great Resignation, many are unaware of the impact of mass turnover on cybersecurity. In such uncertain times, learn how to keep your business cyber secure by automating user identity lifecycle management.

    Learn more

    5-Step Cybersecurity Strategy for Your Organization

    With attacks and threats on the rise, your organization needs a fool-proof security strategy. Implementing a solid cybersecurity plan that suits your organization’s needs can be challenging.

    Watch now

    Security filtering and WMI filtering: Explained

    There might be occasions where you might not want to apply the group policies for a select computers or users. This is where security filtering and Windows Management Instrumentation filtering come In handy.

    Read on to dig deep

    Restrict Users from Executing Malicious Code from the Internet

    It is likely that some users, unknowingly, can help an attacker by downloading or executing a malicious set of codes from the internet. So, it becomes crucial to man your Active Directory security station using GPO.

    See how

    How to allow or prevent non-admins from rebooting or shutting down PCs

    When there rises a necessity where a non-administrator might be required to turn-off or reboot a system, it is important to know how to grant or deny privileges for a non-admin. Secret?... nah, the process can be done using GPO.

    More on the GPO
  • October 2022

    Stories for you

    FBI checklist: Recommendations to mitigate ransomware attacks

    The FBI has come up with a list of recommendations to help organizations prevent ransomware attacks and data breaches. Download your free copy now.

    Claim your copy now

    Here's a list of event IDs to track 5 common cyber threats

    Finding event IDs that might indicate a security breach requires a carefully planned auditing and monitoring strategy. Here's a guide to help you detect 5 common cyber threats.

    Check the guide

    Checklist for Active Directory Management

    It is important to identify bottlenecks in Active Directory and resolve them before they cause harm. Take a look at the key aspects to ensure that everything is working as it should be in your AD.

    Browse the checklist

    Here’s some best practices to secure Active Directory

    It is no surprise that organizations depend on Active Directory for day-to-day IT operations. Owing to its sheer importance it is crucial to maintain high standards of Active Directory security.

    Secure your Active Directory
  • July 2022

    Stories for you

    PAM and Zero Trust: Better together

    The core idea of Zero Trust is to ensure secure access at all times. With its just-in-time privileges and the least privilege access concept, PAM can lay a solid foundation for Zero Trust security.

    Know how

    FBI checklist: Recommendations to mitigate ransomware attacks

    The FBI has come up with a list of recommendations to help organizations prevent ransomware attacks. We've prepared a guide that breaks down the FBI's recommendations into actionable steps.

    Read now

    Are machines taking over?

    With machine identities outnumbering human identities and holding access to sensitive data, it is crucial to secure them. Learn how machine identity management is important for overall security posture.

    Tell me more

    Anatomy of a DDoS attack

    Considered to be one of the most lethal adversaries in cyberspace, DDoS attacks have a macro-level effect on an organization's operational capabilities. Also, this attack unfolds in multiple stages.

    Check out

    Webinars for you

    The road to Zero Trust begins with authentication

    Adopting Zero Trust is the next step for companies to secure their critical assets and hybrid networks. Join the webinar to learn how authentication forms the base for a successful Zero Trust journey.

    Register Here
  • June 2022

    Stories for you

    Protect your crypto currencies from cyberattacks

    The rapidly growing crypto market does not bring you just high returns, it also brings along cyber threats. The security gaps in crypto wallets, if exploited, can cost you everything. See how you can protect your crypto.

    Secure your crypto

    Raise your defenses against RaaS: Ransomware-as-a-Service

    Most cyberattacks are all driven by one key factor: money. By exploiting your vulnerabilities, attackers hold you at ransom in exchange for your valuable data. Learn how to protect yourself from RaaS.

    Beware of ransomware

    Supply chain attacks: An urgent cyberthreat

    The attack surface for cybercriminals extends far beyond the organizational perimeters. Often, external vendors are used as a gateway to gain access to a network. Here's how you can prevent such attacks.

    Tell me more

    Decentralize identity management with blockchain

    The rapid increase in the number of digital identities has led to a corresponding increase in cyber attacks. Here's why decentralized identities are the way forward, and how blockchain can help.

    Read more

    Guard yourself against application security vulnerabilities

    Data breaches are becoming increasingly common, as bad actors exploit application security vulnerabilities to launch attacks. Take a look at the common ways in which attackers hijack applications.

    Tighten application security

    Webinars for you

    Humans may be the weakest link, but UEBA can help you fix this

    Humans are the weakest link in the cybersecurity chain, and the primary cause of insider threats. Join me to learn how you can address this challenge by integrating UEBA with Zero Trust.

    Fortify Zero Trust
  • May 2022

    Stories for you

    A brief history of cyber laws

    Flip through a flashback that takes you through some of the major events and decisions that have shaped the world's notions of cybercrime and their subsequent legislative reforms.

    Flip through

    Is cyberspace the new battlefield?

    Modern warfare is no longer confined to the physical battlefield, and it extends to uncharted territories. Cyberwarfare is much scarier than conventional warfare, for several reasons.

    Find out why

    Cybersecurity needs more intel. Big data can help

    A defense system thrives while operating in a data-driven environment. By combining data analytics with cybersecurity solutions, networks can be powered by a dynamic, context aware cyber-fortress that dares to adapt and improvise.

    Know more

    Webinars for you

    Are machine identities overlooked in your Zero Trust strategy?

    Given the rampant growth in machine identities, Zero Trust won't suffice if it covers only human identities. Learn how you can integrate machine identity management into your Zero Trust strategy.

    Fortify Zero Trust
  • April 2022

    Webinars for you

    Gartner dropped the 'A' in SASE. Here's the new deal - SSE

    The post-pandemic workplace demands IT admins to secure the highly distributed workforce. Gartner's SSE is the ideal solution with a security-first approach. Watch this webinar to learn about SSE.

    Reserve a spot now

    Stories for you

    Privacy Laws: Staying compliant is no longer an option

    The rise in global data privacy laws affects every business and shapes the evolution of cybersecurity solutions. Learn about these laws, their impact on your business, and how you can stay compliant.

    Comply with privacy laws

    We brought home the 2022 Cybersecurity Excellence Awards!

    We kicked off the year on a high note by being recognized for our contributions to the cybersecurity industry. ManageEngine AD360 and Log360 were declared winners under several categories including IAM, IGA, SIEM, SOAR, and data-centric security!

    Here's how we did it

    Who will watch the cyber-watchmen?

    With cybersecurity going identity-based, its systems must be compliant with privacy laws. However, beneath these daunting 'regulations', comes a major boost for authentication systems.

    Find out how

    Navigating the dynamic threat landscape with contextual awareness

    Static security decisions have now become redundant. Learn how you can stay ahead of the changing threat landscape by deploying context-aware systems that make dynamic security decisions.

    Become context-aware

    Why Zero Trust is a must-have for a 5G network

    The 5G technology has revolutionized the digital world with its speed and connectivity. However, new tech gives rise to new cyber threats. So, the only way to secure your 5G network is the Zero Trust way.

    Secure your 5G network
  • March 2022

    Stories for you

    Adopt Gartner's SASE to secure your cloud network architecture

    SASE converges network and security capabilities to secure your highly distributed cloud network. Learn how you can raise your defenses against cloud-based cyber threats with SASE.

    Read more about SASE

    How to stay ahead of cybercriminals?

    This year is not going to be any easy as cybercriminals will continue wreaking havoc on organizations. Learn how you can stay ahead of them using a strong SIEM strategy.

    Stay ahead with SIEM

    Why do humans remain the greatest cyberthreats themselves?

    With human errors causing more than 95% of cybersecurity breaches, it is now more urgent than ever for you to implement cybersecurity solutions that address human fallibility.

    Become cyber smart

    A risk-based stance might be your key to handling a hybrid workforce

    A hybrid workforce is highly dynamic — which is why it's redundant to stick to cybersecurity standards developed exclusively for a remote workforce. A proactive, risk-based approach should be your weapon of choice to combat cyberattacks. Learn how Gartner's CARTA can help.

    Take a risk-based stance
  • February 2022

    Stories for you

    IDaaS—the emerging talk of cybersecurity town

    What steers enterprises towards adopting IDaaS is a perceived solution for post-pandemic workplaces' cybersecurity needs. Learn the relevance of IDaaS in current times.

    Find out why

    With great access privileges comes greater adversaries

    C-level executives enjoy access to critical resources of an enterprise, making them a lucrative target for cybercriminals. Educate yourself about the strategies needed to secure the most-privileged users of a network.

    Know your Achilles heel

    Build a scalable cyber-fortress for your enterprise using CSMA

    Emerging security challenges like WFA & hybrid work needs a unified and dynamic solution to enhance security effectiveness. Learn why organizations are shifting towards the cybersecurity mesh platform to meet these new-age demands.

    Read the article

    Zero Trust: A must-have for your cloud-native architecture

    Powered by microservices, the distributed structure of cloud-native architecture is highly complex and beats traditional security measures. Learn why, businesses are adopting Zero Trust to address cloud-native security concerns.

    Learn more now

    Webinars on-demand

    Hybrid workforce security in 2022 - Zero Trust and SASE are your best bet

    It's no surprise that hybrid work is here to stay. Revising your IAM framework should be your priority in 2022. Let's talk about the potential security challenges of a hybrid workforce, and how Zero Trust and SASE can keep you out of harm's way.

    Watch now

    5 tactics that will make it hard for attackers to exploit Active Directory

    Active Directory (AD) environments are constantly abused in various stages during a cyberattack. Watch this video to learn about five tactics that you can use to strengthen your AD environment's security.

    Watch now
  • January 2022

    Stories for you

    Get up to speed on IAM trends for 2022

    It's imperative that organizations step up to tackle the increasingly complex threats and attacks in the ever evolving IAM landscape. The best way to do it is by keeping yourself updated with the most happening trends in the IAM space. Take a look at what Gartner and other industry experts have to say.

    Download whitepaper

    Looking back at ADSolutions in 2021

    2021 was the year when hybrid work became a new standard. Here's a look back at how we enhanced the capabilities of our suite of solutions to handle the new demands and challenges of today's world.

    Take a look

    How to protect your C-suite from cybercriminals

    Top-level executives, often with privileged access to critical resources, do use their personal devices and public internet while traveling, making them an easy target. Take a look at how you can navigate this challenge to keep them safeguarded.

    Learn more

    The benefit of IdaaS for your business

    Identity as a service is gaining more importance today where users are able to access their data from anywhere (including public Wi-Fi) and are no longer bound to accessing resources only from their workplace. Learn how IdaaS can help you address today's identity management demands.

    Learn more

    Webinars on-demand

    Simplify the IAM challenges of 2022

    The IAM landscape is constantly shifting, and this year comes with its fair share of challenges. See how you can take these challenges head on with our IAM solution.

    Watch now

Check out our other resources

  • Daily news update  
  • Active Directory knowledge base  
  • PowerShell scripts