Subscribe

IAMRoundup

A monthly curation of our best stories.
We show only what you need.

Thanks for subscribing! Our best news and stories will be dropped in your inbox every month.

  • Please enter a business email id
  •  
  •  
    By clicking 'Subscribe', you agree to processing of personal data according to the
    Privacy Policy.
  • 2020
  • 2021
  • December 2020

    Stories for you

    We're making it easier for you to receive only the information you need

    As we're offering year-end deals on our solutions, we're making it easier for you to know the details. Just click the link below to select the products you're interested in, and we'll send you only the details you need.

    Update your preference

    Enhancing your defenses against critical data loss

    Protecting critical data from falling into the wrong hands is harder than ever. This e-book helps IT admins curb threats to sensitive date.

    Download your copy

    3 simple ways to drastically cut down Active Directory administration costs

    Using native Active Directory tools to tackle today's IAM challenges is ineffective and puts an undue strain on your organization's IT budgets. Our e-book shows you how you can avoid it.

    Read e-book

    CISAs recommendations to recognize and avoid email scams

    Email borne cyberattacks are growing rampant due to remote work. Read our e-book and learn more about what they are, how they work, and what you can do to avoid them.

    Get your e-book

    Webinars on-demand

    Building a cybersecurity strategy that's resilient to remote-work challenges

    Learn from IAM thought leaders about how to build a cybersecurity strategy that withstands remote work challenges. MartinKuppinger, principal analyst at KuppingerCole, and Jay Reddy, senior technical evangelist at ManageEngine, share their tips.

    Watch the webinar
  • November 2020

    Stories for you

    A complete guide to HIPAA-NIST compliance crosswalk

    Implementing HIPAA security rules can be challenging. Read our e-book to know how HIPAA security rules can be better implemented by following the NIST Cybersecurity Framework.

    Download your copy

    Data security best practices for remote workers

    Remote working makes your network more vulnerable to attacks. Here is an admin's guidebook to the best practices you can follow

    Get your guide

    Zero Trust leads the way to remote work security

    Enforce access control and eliminate unauthorized access to data and resources. Learn the 6 action-steps of Zero Trust implementation to get a bird's eye view of your network.

    Download e-book

    Webinars on-demand

    A 5-step action plan for threat detection using user logon activity

    How can you use user logon activity to spot security threats in your network? What are the logon patterns that indicate a breach. Our expert answers these questions and much more in the webinar.

    Watch webinar video
  • October 2020

    Stories for you

    Perfecting your remote data security strategy

    Here are 5 easy-to-implement data security best practices that will help keep your critical data secure.

    Get your copy

    A definitive guide to fortifying critical PHI

    Backing up PHI is no easy task. Learn the best practices to secure electronic health records, prevent data loss, and meet compliance regulation.

    Download your PHI guide

    Avoid anomalies in email activity go unnoticed

    Learn how to detect and mitigate anomalies before they snowball into a huge data breach.

    Download Guide

    Overcome native limitations in SharePoint backup and recovery

    Learn about the limitations of native SharePoint tools for backup and restoration, and techniques to overcome these limitations.

    Download your copy

    Webinars on-demand

    5 points to consider while reviewing your disaster recovery plan

    What factors will help you decide which data to backup? Will the 3-2-1 backup plan work for all organizations? What goes into an effective DRP ? Our expert answers these questions and much more in the webinar.

    Watch the webinar

    Building a warning system to spot insider threats

    A recent Ponemon Institute study revealed that insider threats have gone up by 47%. Watch how you can create early warning systems to identify such business-crippling insider threats.

    Watch webinar video
  • September 2020

    Stories for you

    4 key cybersecurity monitoring pillars that check every box

    To ensure your organization checks all the necessary boxes to have a strong cybersecurity framework, here are four key cybersecurity monitoring pillars that you can follow. Verify your safety now

    Download your copy

    5 pain points in Active Directory user account management

    If you're spending too much time and resources to manage Active Directory (AD) user accounts, learn how you can overcome 5 common pain points in Active Directory user management.

    Read e-book

    Remediating the gaps in your anti-ransomware strategy

    Discover the pitfalls in your defense against ransomware, and eliminate them with our 3-step strategy. Learn how you can detect threats and stay resilient to ransomware attacks.

    Get the guide

    Weekly podcasts with topics chosen by you

    We've had many people suggest that we start a podcast tailor-made for our audience. So, we're launching our new podcast this month, Identitude, and we want you to choose what we talk about.

    Choose the topic you want

    Webinars on-demand

    Password management practices to plug remote work's loopholes

    With remote working having its fair share of security gaps, we show you password management practices that you can implement so that those loopholes aren't another burden.

    Reserve

    A 5-step plan for effective data protection

    Protecting data from hackers is challenging. Join the discussion with our cybersecurity guru to learn his five step plan to fortify critical data and steer clear of hefty fines.

    Reserve

    Aligning your SIEM framework with NIST guidelines

    Our SIEM expert shows you how attackers compromise your organization's security, the tactics they use, and how you can defend against them by adhering to NIST guidelines.

    Reserve

    Is Zero Trust model your redemption to COVID themed attacks?

    Disappearing network perimeter is no illusion. Cybercriminals are taking advantage. Let's talk NIST recommended Zero Trust security framework for the new normal.

    Reserve
  • August 2020

    Stories for you

    How healthcare organizations fortify critical PHI from hackers

    Healthcare IT leaders are tasked with ensuring patient data integrity, submitting to compliance, and mitigating insider risks. Learn how healthcare delivery can be made more secure.

    Learn how

    What the FBI recommends to prevent BEC attacks

    Learn about the anatomy of BEC scams, some recent cases of successful attacks, and how you can steer clear of such scams with timely detection and proactive countermeasures.

    Get your copy

    Streamlining your disaster recovery plan

    Implementing a disaster management plan is no small feat. Learn the key components of a disaster recovery plan, and how you can streamline the process.

    Take a look

    Webinars on-demand

    The NIST Cybersecurity Framework: 5 core functions and how you can align with them

    According to Gartner, the NIST Cybersecurity Framework (CSF) will be adopted by 50% of US organizations by the end of 2020. Find out how you can align with the core functions of the NIST CSF.

    Register now

    Countering ransomware: A 5-step action plan towards threat detection, backup, and recovery

    If you are attacked by ransomware today, could you recover critical data without compromise? We discuss how organizations can strengthen their front-line of defense against ransomware.

    Book your slot now

    5 steps to perform risk assessment in your network

    The first step to building an efficient security strategy is to perform a risk assessment. Join our IT security expert as he helps you perform an extensive assessment in your network.

    Grab a seat now
  • October 2021

    Heads up!

    We're currently running year-end offers on our solutions*

    If you were having an eye on one or more of ManageEngine's solutions, now would be the right time to dive in! We're running offers on our solutions for a limited time. If you would like to avail the offers, all you have to do is let us know that you're interested.

    I'm interested

    *This offer is valid until 31st December, 2021 only. Please note that this offer is applicable only for direct new purchases from ManageEngine and is not applicable on renewals and upgrades.

    Stories for you

    Check your security score with ADManager Plus

    With ADManager Plus build 7116 and above, you can check if your product is configured securely and reduce security risks in your environment.

    Learn more

    How ransomware attacks weaponize Active Directory

    Many recent ransomware attacks have exploited Active Directory. We describe the tactics used by the threat actors and explain preemptive defense measures you should adopt.

    Read now

    Zero-trust #101: Here's everything you need to know

    Today, anybody can be a malicious threat actor. So, how do you defend your organization? That's where the zero-trust security standard comes into play. Learn more about its components and best practices, and keep your organization safe and secure.

    Learn more

    Webinars for you

    [Webinar] 5 tactics to make it hard for attackers to exploit Active Directory

    When you bolster Active Directory (AD) security, you impede four key stages of any cyberattack. In our upcoming webinar, we explain how AD is abused in these stages and discuss five defense tactics to protect your AD from attacks.

    Save your spot
  • September 2021

    Fresh in the news

    Stolen credentials lead to data theft at the UN

    Threat actors leveraged the stolen credentials of a UN employee to gain access to a proprietary project management software. Learn more about this data theft and how a basic security measure could've prevented the attack.

    Read now

    Stories for you

    The California Privacy Rights Act: Getting ready for CCPA 2.0

    The California Privacy Rights Act (CPRA) will take effect from January 1, 2023. However, information collected from as early as January 1, 2022 will come under the scrutiny of the CPRA. Learn how you can stay compliant.

    Get the guide

    Defend against brute-force attacks powering ransomware

    Learn how attackers have been leveraging RDP brute-force attacks to spearhead ransomware campaigns in the pandemic, the tools they use, and five steps you can take to thwart their efforts.

    Read now

    Brush up your basics on Active Directory Users and Computers snap-in

    Active Directory Users & Computers snap-in is the go to tool for administrators to carry out day-to-day activities. Learn how you can simplify your administrative burden and make AD management more efficient.

    Level Up Now

    Moving Active Directory Users and Computers from one domain to another: Best Practices

    Migrating users and computers from one domain to another can be quite tricky, especially when the settings of these objects have to be preserved. Our guide details how you can go about migrating AD objects with PowerShell and Native Windows tools.

    Read now
  • August 2021

    Trending news

    Microsoft confirms another 0-day vulnerability in Print Spooler

    Microsoft released an advisory for a new vulnerability in the Windows Print Spooler service. This vulnerability allows local attackers to gain access to system privileges.

    Watch video

    Stories for you

    Weak passwords can wreck your AD. Find and eliminate them now

    Weak passwords are an open invitation for hackers to exploit user accounts. Find the users with weak passwords and force them to change their passwords the next time they log on.

    Eliminate weak passwords

    Wrong Access Control Entries (ACE) can compromise your data

    ACEs dictate access permissions that secure AD objects from critical data exposure. But wrong ordering of ACEs can have devastating consequences. Learn how to get the ACEs right and secure your organization.

    Get your access permissions right

    3 things to do before raising your AD forest functional level

    Raising your forest functional level gives you access to new and improved AD DS functionalities. There are certain things to take care of before raising the functional level so that all systems remain functional.

    Ensure a smooth upgrade

    Cybersecurity hack: Combining threat intelligence with UEBA

    Combining threat intelligence with user and entity behavior analytics (UEBA) is effective in combating external attacks as well as internal threats. Learn how you can implement capabilities in your organization.

    Learn the hack

    Webinars for you:

    Lessons from high-profile Active Directory breaches

    Learn how AD was compromised in recent high-profile attacks including the SolarWinds supply chain attack and the Colonial Pipeline ransomware attack, and what defense measures you should adopt.

    Register now
  • July 2021

    Stories for you

    PowerShell: How to Find Password Expiration Date for AD Users

    As a system administrator, you will need to keep track of all user accounts and their expiration dates to prevent users from getting locked out. However, in a large organization, it is easier said than done. Use our PowerShell script to get a list of all user accounts along with when their passwords will expire.

    Ready-to-use PowerShell script

    Perform Active Directory environment clean-up with PowerShell

    An empty AD group can contain certain permissions and access rights. Such groups are often not monitored or accounted for leaving them potential to cyberattacks. The following PowerShell script will help spot empty groups and automatically delete them.

    Get your script

    Controlling USB access on select devices using GPO

    USB devices have become an indispensable way to store data. But, due to the IT security threat they pose, admins block the use of USB devices on their computers. Learn how to do so with the help of GPO's.

    Learn how

    Learn about Active Directory replication in a nutshell

    In any organization, large or small, it is imperative that directory data is regularly updated and available for access to all users. Learn the mechanisms that contribute to the Active Directory replication model.

    Find out how

    Webinars for you:

    How to mitigate against zero-day vulnerabilities

    The recent Proxylogon vulnerabilities in Microsoft's Exchange servers show how easily organizations can be compromised. We dive into the process of these attacks and see how you can keep your organization secure from such zero-day vulnerabilities.

    Save your spot

    European Union recommendations to prevent cyberattacks on SMEs

    Learn about the five most common cybersecurity challenges SMEs currently face, and how you can overcome them using the The European Union Agency for Cybersecurity's best practices recommendations.

    Register now
  • June 2021

    Stories for you

    Automate access management with risk-based contextual authentication

    When security measures like MFA are implemented enterprise-wide, end-users are subjected to increased user-friction. Learn how to avoid unnecessarily stringent measures and apply access policies based on risk-factors and context.

    Implement conditional access now

    Manage resource-intensive processes and enhance end-user UX

    Heavy hardware resource utilization on end-user machines will lead to reduced productivity by hindering users from getting their job done. This PowerShell script helps admins manage and kill memory-hogging processes.

    Get your script

    Notify users before their password expires, for free

    Enforcing regular password changes is a widely followed security practice. However, if end users miss, or ignore password expiring reminders, they end up locked out of their accounts and your help-desk is flooded with calls. Send account expiration reminders to users via SMS and email notifications with our free tool.

    Reduce account lockouts now

    Breeze through troubleshooting with Windows Logs

    As an administrator, security logs are the first place to look at to troubleshoot system problems and spot unauthorized access attempts. However, stifling through of system log information is laborious. Use our PowerShell script to get the most recent error messages in the system logs.

    Ready-to-use PowerShell script

    Webinars on-demand

    [On-demand] Applying the cyber kill chain framework to identify and combat cyberattacks

    Understanding the cyber-attack chain model can help you put in place strategies to “kill” or contain the attack at various stages. Watch my webinar to protect your IT ecosystem from pesky attackers.

    Watch video

    [Live] The NIST Cybersecurity Framework: 5 core functions and how you can align with them

    According to Gartner, the NIST Cybersecurity Framework (CSF) will be adopted by 50% of US organizations by the end of 2020. Find out how you can align with the core functions of the NIST CSF.

    Reserve your spot
  • May 2021

    Stories for you

    Understanding and mitigating Exchange zero-day vulnerability exploits

    We take a deep dive into how attackers exploited the zero-day vulnerabilities in Microsoft's Exchange servers, mitigating the vulnerabilities in your organization, and performing damage control and threat analysis if your organization has been compromised.

    Get your e-book copy

    A step-by-step guide to raise forest functional levels

    An Active Directory functional level determines what capabilities of Active Directory Domain Services are available for a particular forest or domain. Learn all there is to know about raising forest functional levels, and the best practices that are to be adopted while raising them.

    Level up now

    Struggling to add attributes to your Global Catalog Replication set?

    It is common to notice that few Active Directory attributes are not natively present in the global catalog replication set. Configure additional attributes to be replicated to the Group Catalog using our ready-to-run PowerShell code.

    Get your PowerShell script

    Leveraging PowerShell as an Active Directory group management tool

    Group management can be quite a challenge for Active Directory administrators day in and day out. We've collated a list of basic PowerShell scripts and commands that admins can use while working with Active Directory groups.

    Get your PowerShell script

    Webinars on-demand

    How to think like an attacker and prevent password attacks

    Password attacks are the go-to strategy for cybercriminals even in 2021. We are going show you how various password attacks are carried out and discuss steps and tools to help you get ahead of attackers.

    Register now
  • April 2021

    Stories for you

    Free tools for efficient Active Directory network management

    Check out our list of free Active Directory (AD) tools that you can use for better AD network management. From a Last Logon Reporter to a DC monitor, we got you covered.

    Get your free AD tools

    Why SMBs should prioritize password management in 2021?

    SMBs can drastically reduce their attack surface if they get password management right. We look at 4 unique password management hurdles SMBs face, and how SMBs can overcome these hurdles.

    Learn more

    Handle AD permissions like a pro

    Get up to speed on Active Directory object permissions and grant access more securely. We look at AD permissions, inheritance, and how permissions can be assigned in AD.

    Level up now

    Are temporary folders getting out of control?

    Temporary folders accumulating over time take up considerable space. Clean up unwanted folder contents with our PowerShell script to delete all the temporary folders contents in a go.

    Get your PowerShell script

    Webinars on-demand

    Top 5 identity and access management challenges of 2021 and how to overcome them

    Predictions by Gartner and Forrester on IT management trends post-COVID-19 show identity management could get more challenging in 2021. Here's how to overcome them.

    Save your spot
  • March 2021

    Stories for you

    5 Active Directory challenges of 2021 and how to overcome them

    Predictions by Gartner and Forrester on IT management trends post-COVID-19 show active directory management could get more challenging in 2021. Here's how to overcome them.

    Simplify AD management

    Reducing account compromises by 99.9% using MFA

    Microsoft says that using multi-factor authentication (MFA) can reduce account compromises in your organization by 99.9%. Know why MFA is effective, and learn the best practices for MFA from our guide.

    Get the guide

    5 best practices to ensure long-term Office 365 security

    As organizations increasingly rely on Office 365 to facilitate remote work for a distributed workforce, IT admins must ensure that their employees can remain productive without increasing cybersecurity risk.

    Secure Office 365

    Webinars on-demand

    The US FCC's cybersecurity recommendations for SMBs in 2021

    Join our webinar to learn all about the cybersecurity best practices recommended for SMBs by government organizations such as the US FCC, UK NCSC, and Australia's ACSC.

    Save your spot

    Manage cybersecurity risks better with the NIST Cybersecurity Framework

    Strengthen your organization's security posture by knowing how to manage cyber security risks better with the help of 5 core functions of the NIST Cybersecurity Framework.

    Watch now
  • February 2021

    Stories for you

    How to strengthen your SIEM framework for 2021

    A 2020 IBM report saying it takes about 280 days to detect a breach shows that traditional SIEM frameworks are no longer strong enough. Learn how you can strengthen your SIEM framework for 2021 using AI, and more.

    Get the guide

    Password security for 2021: 5 essential measures

    81% of data breaches are due to compromised passwords, experts say. To ensure your organization isn't a part of that 81%, we bring you 5 essential password security measures for a secure 2021.

    Learn more

    3 things every SharePoint administrator should monitor

    Any performance hiccup in a SharePoint environment could have major repercussions on business continuity. Here are 3 things every SharePoint administrator should monitor to ensure seamless workflow.

    Download guide

    Webinars on-demand

    Applying the cyber kill chain framework to identify and combat cyberattacks

    Understanding the cyber-attack chain model can help you put in place strategies to “kill” or contain the attack at various stages. Tune in to our live webinar to protect your IT ecosystem better.

    Book your slot

    Maximizing IAM performance with the right metrics

    The performance of your IAM framework hinges not only on the number of tools but also on how well you utilize them. Watch our expert's webinar to learn about an 8-step framework for tracking and measuring crucial IAM metrics.

    Watch webinar
  • January 2021

    Stories for you

    A flexible password framework for your remote workforce

    As workforces are now divided into work-from-home and work-from-office, we created a flexible password framework guide that can keep your organization secure regardless of its workforce type.

    Get your guide

    6 ways to get more out of your SharePoint audit logs

    Using native tools to audit an enterprise level SharePoint environment has its limitations. Read this e-book to know how to overcome them.

    Download e-book

    Remediating the gaps in your anti-ransomware strategy

    If you are attacked by ransomware today, could you recover critical data without compromise? Discover the pitfalls in your defense against ransomware, and eliminate them with our 3-step strategy.

    Get the guide

    6 essential hacks for your IAM program in 2021

    Getting the most of your IAM program or demonstrating its ROI can be quite tedious without metrics. In this e-book, we've put together 6 hacks that'll help you define and measure relevant metrics.

    Read e-book here

    Webinars on-demand

    Is Zero Trust model your redemption to remote work vulnerabilities?

    Trust is a vulnerability where humans are the new perimeter. However, the trust you've not yet established can't be misused. Let's talk NIST recommended Zero Trust security framework.

    Watch now

Check out our other resources

  • Daily news update  
  • Active Directory knowledge base  
  • PowerShell scripts