Identity and access management | February 14, 2019File server auditing: Excluding certain files and file typesIn order to improve the efficiency of audit reports, administrators auditing a file server may decide not to monitor certain files and file types....
Endpoint Central | February 13, 2019Microsoft Patch Tuesday updates for February 2019Microsoft has just released this month’s security updates for its products. Before getting on with the list of...
General | February 12, 2019ROI calculators for software: Common problems and our uncommon solutionOften, organizations use ROI calculators to determine the return on investment for using its software. However...
ADAudit Plus | February 11, 2019Tracking insider threats with AIIf you thought masked hackers in dark rooms spreading malware were your only security concern, think again....
General | February 8, 2019Thwart password spray attacks to secure employee access to cloud appsChances are you've heard of traditional credential-based attacks on Active Directory (AD)...
Identity and access management | February 5, 2019Telecommuting is catching up fast—it's on you to empower your workforceAccording to Upwork’s Future Workforce Report, fifty-five percent of the surveyed...
General | February 1, 2019Five worthy reads: Augmented analytics paves the wayFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
OpManager | February 1, 2019Mastering the art of network administrationNetwork administration is a job that’s easier said than done. The heterogeneity of the...
OpManager | January 31, 2019OpManager 12.3 receives IT Pro Recommended AwardThe latest build for OpManager 12.3 has been gaining some recognition from industry...
M365 Manager Plus | January 30, 2019All you need to know about the November Azure AD MFA outagesIn early November of 2018, Microsoft’s Azure Active Directory (AD) multi-factor...