• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Author:Andrew Mb

  • Andrew Mb
    Andrew Mb
    What is role-based access control?

    ADManager Plus | January 5, 2026

    What is role-based access control?

    Role-based access control (RBAC) is a method for controlling access to resources based on...

    What is access rights management, and how is it different from access control?

    ADManager Plus | December 31, 2025

    What is access rights management, and how is it different from access control?

    Access rights management (ARM) is the overarching governance and administrative discipline...

    What is access control? Understanding access control components, types, and implementation

    ADManager Plus | December 23, 2025

    What is access control? Understanding access control components, types, and implementation

    Access control is the fundamental security mechanism used to control who can access...

    Best practices to clean up Active Directory | ADManager Plus

    ADManager Plus | September 4, 2025

    Best practices to clean up Active Directory | ADManager Plus

    Why clean up your Active Directory environment? Active Directory (AD)...

    List of Active Directory ports | ADManager Plus

    ADManager Plus | September 4, 2025

    List of Active Directory ports | ADManager Plus

    What are Active Directory ports? Active Directory (AD) ports are specific...

    What is LDAP? | ManageEngine ADManager Plus

    ADManager Plus | August 18, 2025

    What is LDAP? | ManageEngine ADManager Plus

    What LDAP is and why it's still relevant in 2025 The Lightweight Directory...

    Attribute-based access control | ManageEngine ADManager Plus

    ADManager Plus | June 23, 2025

    Attribute-based access control | ManageEngine ADManager Plus

    Attribute-based access control explained Attribute-based access control ...