• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog / Author:Andrew Mb

  • Andrew Mb
    Andrew Mb
    What is access control? Understanding access control components, types, and implementation

    ADManager Plus | February 6, 2026

    What is access control? Understanding access control components, types, and implementation

    Access control is the fundamental security mechanism used to control who can access...

    What is role-based access control?

    ADManager Plus | January 30, 2026

    What is role-based access control?

    Role-based access control (RBAC) is a method for controlling access to resources based on...

    What is access rights management, and how is it different from access control?

    ADManager Plus | December 31, 2025

    What is access rights management, and how is it different from access control?

    Access rights management (ARM) is the overarching governance and administrative discipline...

    Best practices to clean up Active Directory

    ADManager Plus | September 4, 2025

    Best practices to clean up Active Directory

    Why clean up your Active Directory environment? Active Directory (AD)...

    Essential Active Directory ports you should enable in your firewall

    ADManager Plus | September 4, 2025

    Essential Active Directory ports you should enable in your firewall

    What are Active Directory ports? Active Directory (AD) ports are specific...

    What is LDAP? Understanding the LDAP protocol, servers, ports, and how it works

    ADManager Plus | August 18, 2025

    What is LDAP? Understanding the LDAP protocol, servers, ports, and how it works

    What LDAP is and why it's still relevant in 2025 The Lightweight Directory...

    What is attribute-based access control?

    ADManager Plus | June 23, 2025

    What is attribute-based access control?

    Attribute-based access control explained Attribute-based access control ...