Technical Documents
Administrator's Guide
Learn how to install, configure, manage, and maintain AD360, including detailed module settings and administrative best practices.
Quick Start Guide
Learn how to deploy and configure the essential settings of AD360 and its components for a successful initial setup.
Privileges and Permissions Guide
Understand the roles, privileges, and permission requirements needed to securely operate AD360 across Active Directory and integrated services.
System and Port Requirements
Understand the hardware, software, and network port requirements needed to deploy and run AD360 efficiently across your environment, ensuring optimal performance and connectivity.
Database Migration from PostgreSQL to MS SQL.
Learn how to migrate AD360 data from the built-in PostgreSQL database to Microsoft SQL Server, including prerequisites, required permissions, configuration steps, and best practices for a secure and successful migration.
High Availability Guide
Learn how to configure high availability for AD360 and its supported components using automatic failover, ensuring uninterrupted access, improved reliability, and business continuity during system or application failures.
Reverse Proxy Guide
Learn how to configure AD360 as a reverse proxy server to securely expose integrated products, hide backend server details, and enable context-based or port-based access for external users.
SSL Guide
Learn how to secure AD360 and its integrated components by enabling HTTPS, generating or importing SSL certificates, and binding CA-signed or self-signed certificates for encrypted communication.
Reverse proxy for AD360 using IIS
Learn how to securely deploy AD360 for remote access by configuring Microsoft IIS as a reverse proxy, including SSL/TLS setup, request routing, and external proxy integration to enhance security and performance.
Solution Architecture
Understand the architecture of AD360, including its core components, and data flow to effectively design, deploy, and integrate the solution across your identity governance and administration environment.
Licensing components explained
Understand how AD360 is licensed across its core IAM modules and add-ons, including ADManager Plus, ADAudit Plus, ADSelfService Plus, Microsoft 365 management, backup, auditing, and governance features.
Security Measures Available in AD360
Understand how AD360 safeguards identity data with layered authentication, encryption, and access controls.
Brochures
Guides
Ebooks
Defending against Active Directory attacks
Understand five common Active Directory attacks, identify security gaps, and apply defensive strategies by thinking like an attacker to pre-empt threats.
3-step action plan to ensure critical data protection and compliance
Strengthen data protection with this 3 step action plan to ensure critical data protection and compliance
Strengthen your security posture: 10 Critical Windows Event IDs to monitor
Detect hidden threats with a crisp guide to the 10 Windows Event IDs that matter.
Advanced M365 Auditing and Management
Streamline Microsoft 365 management with practical auditing, reporting, and automation that curb group sprawl, sharpen security, and improve day-to-day performance.
Harden your MFA against brute-force attacks
Strengthen your MFA against modern brute-force attacks with practical, method-specific defenses that close gaps in TOTP, push, biometrics, and hardware tokens.
5 Steps to Implementing MITRE ATT&CK framework for enhanced threat detection
Implement MITRE ATT&CK in five steps and power detection with Log360 - elevating visibility and speeding response
A no-code guide to automate JML life cycle management
Automate JML life cycle with a no-code playbook that secures onboarding, role changes, and offboarding.
Essential Eight explained
Navigate the Essential Eight maturity model with clear guidance, MITRE ATT&CK mapping, and SIEM-driven practices for real-world compliance.
The cost of Active Directory mismanagement
Expose the hidden costs of AD mismanagement and fix them with proven practices, stronger governance, and unified IAM.
Data Sheets
Videos
Navigate the Future of Access Management
Watch the discussion between ManageEngine and KuppingCole for a holistic view of access management in the age of hybrid identity and AI agents.
Generative AI and the Future of Identity Governance
Explore how generative AI can modernize identity and access management, strengthen zero trust, and automate identity governance with ManageEngine AD360.
The Cost of AD Mismanagement: Hidden Risks, Compliance Failures & How to Fix Them
Explore real-world AD mismanagement scenarios, understand their security and operational impact, and see how AD360 helps you detect, remediate, and prevent them.
Zero Trust on a Shoestring: Prioritizing High-Impact Controls for Immediate Risk Reduction
Discover how to apply Zero Trust principles on a tight budget by prioritizing targeted MFA, privilege access reviews, and automated user lifecycle management.
Blogs
What is PCI DSS compliance? Is your organization compliant?
Understand what PCI DSS compliance is, why it matters for cardholder data, and how AD360 supports access control and audit readiness.
Why should your organization comply with the GDPR?
Understand why GDPR compliance strengthens privacy, improves security posture, and see how AD360 supports access governance, auditing, and data protection by design.
5 simple steps to HIPAA compliance
Learn the core HIPAA requirements around PHI, follow five practical steps to strengthen security, and see where AD360 supports access control and safeguarding patient data.
IAM security best practices for PCI DSS compliance
Explore IAM best practices that map to PCI DSS requirements, minimize handling of cardholder data, and strengthen access control, password policies, and encryption in your environment.
IAM security best practices for GDPR compliance
Explore IAM best practices that help you meet GDPR principles like data minimization, access governance, and privileged access control for EU personal data.
NIST password guidelines: Bolstering password security
Explain the latest NIST password recommendations, strengthen password and passphrase policies, and align your organization's authentication practices with modern security standards.
3 ways to protect vulnerable healthcare data from security attacks
Learn three practical ways to secure PHI in healthcare environments, strengthen auditing and insider-threat detection, and use AD360 to support HIPAA and HITECH compliance.
Why SIEM is the best defense against cyberthreats
Explain how SIEM strengthens threat detection, insider-risk monitoring, and incident response, and see how AD360's identity insights complement SIEM for end-to-end security.
User and entity behavior analytics (UEBA) explained
Understand how UEBA uses baselining and machine learning to detect anomalous behavior, uncover insider threats, and complement AD360's identity and access security.
The secret sauce to detect insider threats
Learn how to identify different types of insider threats, reduce human-error risks, and use UEBA and AD360 to spot anomalous behavior before it leads to a breach.
Insider threats 101: Detect, investigate, and then mitigate
Learn what insider threats look like, detect suspicious user behavior early with UEBA and SIEM, and investigate and mitigate incidents before they cause major damage.
6 essential capabilities of a modern UBA solution
Explore the six must-have capabilities of a modern UBA solution, from risk scoring and machine learning to integrations and visualization, to strengthen threat detection with AD360.
What are the risks involved in shadow IT
Understand how unsanctioned apps and BYOD create data, malware, and compliance risks, and learn practical steps to discover, educate, and control shadow IT with AD360.
Maintain confidentiality of critical information by implementing the POLP
Learn how to apply the principle of least privilege (POLP) across users and roles, minimize excessive permissions, and protect confidential data from accidental or malicious misuse.
The principle of least privilege explained
Understand the principle of least privilege (PoLP), avoid privilege creep, and use AD360's time-bound permissions and access reviews to reduce insider and lateral-movement risk.
The rise of adaptive authentication
Explore how adaptive authentication tailors MFA challenges to user risk, reduces login friction, and helps you enforce Zero Trust with context-aware policies in AD360.
Stay ahead of threats with continuous monitoring
Understand what continuous monitoring is, improve visibility into your IT environment, and use real-time alerts and analytics to detect issues and threats before they disrupt business.
3 ways to prevent cyberattacks using real-time alerts
Learn three real-time alerting techniques—account compromise traps, rule-based alerts, and AI-driven monitoring—to detect attacks early and contain them with AD360.
Understanding incident management: processes and importance
Understand what incident management is, follow its key process steps, and see how it helps minimize downtime, improve service quality, and support compliance.
What is IAM? Guide to identity and access management
Learn the fundamentals of identity and access management (IAM), its core components and use cases, and how IAM protects modern hybrid environments from identity-driven threats.
What is compliance management?
Understand what compliance management is, why it matters for risk reduction and stakeholder trust, and how a compliance management system streamlines monitoring, auditing, and reporting.
Hybrid IAM: Securing identities across on-premises and cloud environments
Explore why hybrid IAM is critical for organizations using both on-premises and cloud systems, and learn best practices to secure identities, enforce Zero Trust, and centralize access control.
Remote workforce enablement: Securing identities and access for work-from-anywhere
Learn how to securely enable a remote workforce using IAM, MFA, SSO, and Zero Trust principles, while maintaining productivity and protecting sensitive data with AD360.
Identity lifecycle management for secure IAM
Learn how identity lifecycle management automates user provisioning and deprovisioning, reduces regulatory risk, and breaks down silos by integrating HR, help desk, and IAM systems with AD360.
Role-based access control (RBAC) for identity security
Learn how RBAC simplifies permission management, enforces least privilege at scale, and helps large organizations control access to sensitive data and applications.
Identity protection with UBA
See how user behavior analytics (UBA) helps detect compromised accounts, privilege abuse, and insider mistakes by baselining normal activity and flagging risky deviations in AD360.
Identity automation
Learn how identity automation reduces manual IAM effort, cuts provisioning costs, and improves security by standardizing user onboarding, changes, and deprovisioning with AD360.
Identity threat detection and response: Your all-in-one playbook
Learn what identity threat detection and response (ITDR) is, why identity-centric attacks are rising, and how ITDR works with IAM to detect, contain, and remediate identity breaches.
Identity security
Learn what identity security means, why identities are the new perimeter, and how capabilities like MFA, SSO, PAM, and UBA in AD360 help stop identity-based attacks.
Secure your Active Directory: The essential guide to AD risk assessment
Learn what identity risk assessment is for AD, compare major risk methodologies, and see how structured assessments help reduce identity-related risks in your AD environment.
SASE: What is secure access service edge
Understand what SASE is, how it converges networking and security in the cloud, and why it helps secure remote users, apps, and data with a Zero Trust-ready architecture.
What is PAM? Guide to privileged access management
Learn what privileged access management (PAM) is, why privileged accounts pose unique risks, and how PAM controls like vaulting, MFA, and just-in-time access reduce insider and breach impact.
Multi-factor authentication (MFA)
Learn how MFA combines passwords with extra factors like OTPs or biometrics to block account takeover attempts and strengthen your organization's identity security.
How to implement Zero Trust and its core components with AD360
Understand Zero Trust security, see why perimeter-based models fall short, and learn how to use IAM, MFA, microsegmentation, and continuous monitoring in AD360 to build a Zero Trust architecture.
5 pain points you can overcome in AD user account management
Discover five common AD user management challenges—from bulk provisioning to stale accounts—and see how AD360 helps automate tasks, enforce least privilege, and reduce security risks.
Smart strategies to provision and de-provision Active Directory accounts
Learn how template-based user provisioning and de-provisioning streamlines onboarding, transfers, and offboarding while reducing human error and strengthening security with an IAM-driven approach.
8 steps to effectively manage groups and users in bulk in Active Directory
Follow eight practical best practices to bulk-manage AD users and groups using OUs, security groups, automation, and regular cleanup to save time and close security gaps.
Why native Active Directory tools are no longer enough for modern IAM
See why built-in AD tools struggle with today's distributed, security-first environments and how third-party IAM solutions like AD360 add automation, stronger security, and better visibility for admins.
Active Directory clean-up: Should you automate it?
Explore why regular AD clean-up is vital, the risks of stale accounts and groups, and how automating these tasks improves security, saves admin time, and keeps your directory healthy.
4 AD management mistakes that can weaken your organization's cybersecurity
Learn how everyday admin-account use, poor delegation, weak password policies, and lack of auditing in AD open doors to attackers, and how tightening these practices strengthens cybersecurity.
What is user provisioning and de-provisioning in AD360?
Understand how user provisioning and de-provisioning create, update, and retire employee accounts across their life cycle, and see how AD360 automates these steps to improve security and compliance.
Benefits of automating user provisioning and de-provisioning with AD360
Discover how automating provisioning and de-provisioning with AD360 reduces manual errors, accelerates onboarding and offboarding, and enforces least-privilege access across your directory environment.
Manual vs. automated identity life cycle management
Compare manual and automated identity life cycle management, and see how AD360 uses workflows and HRMS integrations to streamline onboarding, changes, and offboarding while tightening security.
Conditional access: The what, why, and how
Learn what conditional access is, how it applies Zero Trust principles like explicit verification and least privilege, and how context-aware policies, MFA, and continuous monitoring tighten security.
How to empower users and save money with self-service password reset technology
See how self-service password reset (SSPR) lets users securely reset their own passwords using alternate authentication methods, cutting help desk costs and improving productivity while enhancing security.
Enterprise SSO: The antidote to password fatigue
Understand how enterprise SSO reduces password fatigue, strengthens password hygiene, and cuts phishing and brute-force risks by giving users secure one-click access to all their applications.
What are dictionary attacks and how can you prevent them?
Learn how dictionary attacks exploit weak, common passwords using wordlists and personal data, and see how strong passwords, MFA, and account-lockout policies help block these attacks.
What is adaptive authentication and how does it work?
Understand how adaptive authentication evaluates context like location, device, behavior, and network in real time to assign risk scores and dynamically choose the right level of authentication.
What are YubiKeys and how do they work?
See how YubiKeys use public-key cryptography and possession-based authentication to deliver phishing-resistant MFA, enable password-less logins, and secure multiple accounts with a single durable hardware key.
What is SAML authentication and how does it work?
Learn how Security Assertion Markup Language (SAML) enables single sign-on by letting an identity provider securely assert your identity to multiple applications using signed, standards-based assertions.
Passwords are dying: The increasing need for MFA
See why password-only security keeps failing, how modern attacks exploit weak and reused credentials, and how multi-factor authentication (MFA) adds critical extra layers of protection.
Manage expired passwords in your organization
Learn how to design balanced password expiration policies aligned with NIST guidance, train users, and use MFA and self-service tools to handle expired passwords without weakening security or UX.
Authentication vs. authorization: What's the difference and why it matters
Clarify how authentication proves who a user is and authorization decides what they can access, and learn common methods like MFA, RBAC, and ABAC to strengthen access security.
3 key benefits of continuous vigilance
Discover how continuous vigilance delivers real-time visibility into your IT environment, speeds incident response, and uses behavior insights to strengthen both security and business performance.
Conditional Access: How It Protects Your Resources
Learn how conditional access mechanisms evaluate multiple signals to authorize or block user access requests, including step-by-step explanations of signal evaluation and policy enforcement.
A Comprehensive Guide to U2F Security Keys
Understand how U2F security keys provide phishing-resistant two-factor authentication using physical hardware devices and public-key cryptography to protect user accounts from unauthorized access.
How SSO Reinforces Password Security
Learn how single sign-on consolidates authentication across multiple applications, reducing password fatigue, minimizing credential exposure, and strengthening overall identity security in enterprise environments.
The True Cost of Missing Self-Service Password Reset (SSPR)
Discover how SSPR reduces helpdesk costs and downtime by enabling users to securely reset passwords and regain system access independently without IT support intervention.
What is Remote Access VPN?
Understand how remote access VPNs establish secure encrypted connections, enabling employees and authorized users to safely access organizational resources from remote locations as if connected directly to the internal network.
Awards

Honored once again with 2025 TMCnet’s AI in Cybersecurity Innovation Award!
For the second year in a row, ManageEngine AD360 has been recognized at TMCnet’s AI in Cybersecurity Innovation Awards in the Predictive Analytics for Cyber Threat Prediction category.

Recognized as the IAM Innovator of the Year at the ITP.NET Security Awards 2025.
These awards honor the cybersecurity leaders, products, and strategies shaping the future of digital security across the Middle East.

ManageEngine continues its winning streak at the Global Infosec Awards
On its 13th anniversary, Cyber Defense Magazine reviewed over 3,000 cybersecurity vendors worldwide and recognized the top 10% with its 2025 Global InfoSec Awards for innovation and forward-thinking defense strategies. AD360 was named a winner in three categories.

A winner of the Identity and Access Management category at the Cybersecurity Excellence Awards
The Cybersecurity Excellence Awards spotlight companies, products, and professionals who push the boundaries of innovation and excellence in cybersecurity, ensuring their impact is acknowledged in an ever-evolving security landscape.
Analyst Recognitions

A Market Leader in the KuppingerCole Leadership Compass 2025 for Identity Threat Detection And Response (ITDR)
The report highlights AD360’s unified approach, bringing identity access and management, auditing, detection, and recovery together. It also offers a clear view of the ITDR landscape and where identity-centric security is heading.

A Major Player in the IDC MarketScape: Worldwide Integrated Solutions for Identity Security 2025 Vendor Assessment
This recognition highlights AD360’s converged approach to IAM, bringing identity governance, access management, identity risk mitigation, and backup and recovery together within a unified platform.

Recognized for 3 consecutive years in the Gartner® Market Guide for Identity Governance and Administration
The report highlights AD360, Identity360, and PAM360 as solutions that help organizations make the shift from traditional, siloed identity administration to unified governance, PAM, and cloud identity security as part of a proactive defense strategy.
Courses

ADSelfService Plus Starter Kit
Learn to enable secure self-service password resets, account unlocks, and profile updates, reducing help desk load while improving user experience.

ADManager Plus Starter Kit
Learn to simplify Active Directory user and group management with best-practice workflows, reports, and automation for day-to-day administration.


