Filter by
Showing 0 results
Latest
A to Z
Z to A

Technical Documents

 
 
Technical Documents

Administrator's Guide

Learn how to install, configure, manage, and maintain AD360, including detailed module settings and administrative best practices.

 
 
 
Technical Documents

Quick Start Guide

Learn how to deploy and configure the essential settings of AD360 and its components for a successful initial setup.

 
 
 
Technical Documents

Privileges and Permissions Guide

Understand the roles, privileges, and permission requirements needed to securely operate AD360 across Active Directory and integrated services.

 
 
 
Technical Documents

System and Port Requirements

Understand the hardware, software, and network port requirements needed to deploy and run AD360 efficiently across your environment, ensuring optimal performance and connectivity.

 
 
 
Technical Documents

Database Migration from PostgreSQL to MS SQL.

Learn how to migrate AD360 data from the built-in PostgreSQL database to Microsoft SQL Server, including prerequisites, required permissions, configuration steps, and best practices for a secure and successful migration.

 
 
 
Technical Documents

High Availability Guide

Learn how to configure high availability for AD360 and its supported components using automatic failover, ensuring uninterrupted access, improved reliability, and business continuity during system or application failures.

 
 
 
Technical Documents

Reverse Proxy Guide

Learn how to configure AD360 as a reverse proxy server to securely expose integrated products, hide backend server details, and enable context-based or port-based access for external users.

 
 
 
Technical Documents

SSL Guide

Learn how to secure AD360 and its integrated components by enabling HTTPS, generating or importing SSL certificates, and binding CA-signed or self-signed certificates for encrypted communication.

 
 
 
Technical Documents

Reverse proxy for AD360 using IIS

Learn how to securely deploy AD360 for remote access by configuring Microsoft IIS as a reverse proxy, including SSL/TLS setup, request routing, and external proxy integration to enhance security and performance.

 
 
 
Technical Documents

Solution Architecture

Understand the architecture of AD360, including its core components, and data flow to effectively design, deploy, and integrate the solution across your identity governance and administration environment.

 
 
 
Technical Documents

Licensing components explained

Understand how AD360 is licensed across its core IAM modules and add-ons, including ADManager Plus, ADAudit Plus, ADSelfService Plus, Microsoft 365 management, backup, auditing, and governance features.

 
 
 
Technical Documents

Security Measures Available in AD360

Understand how AD360 safeguards identity data with layered authentication, encryption, and access controls.

 
 
 
Technical Documents

Securing AD360 Installation

Secure your AD360 installation by tightening directory permissions, running the recommended scripts, and removing risky leftovers.

 
 
 
Technical Documents

VPAT Guide

Check how AD360 aligns with WCAG 2.x, EN 301 549, and Section 508, including supported, not applicable, and not evaluated items.

 

Brochures

 
 
Brochures

Brochure

Explore how AD360 centralizes identity governance with automated provisioning, access reviews, role controls, and audit-ready reports.

 

Guides

 
 
Guides

Buyers Guide

Understand where AD360 fits, what it’s built for, and whether it’s the right IAM approach for your environment.

 
 
 
Guides

Usecases document

Solve everyday IAM problems with AD360 - onboarding, privileged access, compliance, MFA, threats, and ransomware recovery.

 

Ebooks

 
 
Ebooks

Defending against Active Directory attacks

Understand five common Active Directory attacks, identify security gaps, and apply defensive strategies by thinking like an attacker to pre-empt threats.

 
 
 
Ebooks

3-step action plan to ensure critical data protection and compliance

Strengthen data protection with this 3 step action plan to ensure critical data protection and compliance

 
 
 
Ebooks

Strengthen your security posture: 10 Critical Windows Event IDs to monitor

Detect hidden threats with a crisp guide to the 10 Windows Event IDs that matter.

 
 
 
Ebooks

Advanced M365 Auditing and Management

Streamline Microsoft 365 management with practical auditing, reporting, and automation that curb group sprawl, sharpen security, and improve day-to-day performance.

 
 
 
Ebooks

Harden your MFA against brute-force attacks

Strengthen your MFA against modern brute-force attacks with practical, method-specific defenses that close gaps in TOTP, push, biometrics, and hardware tokens.

 
 
 
Ebooks

5 Steps to Implementing MITRE ATT&CK framework for enhanced threat detection

Implement MITRE ATT&CK in five steps and power detection with Log360 - elevating visibility and speeding response

 
 
 
Ebooks

A no-code guide to automate JML life cycle management

Automate JML life cycle with a no-code playbook that secures onboarding, role changes, and offboarding.

 
 
 
Ebooks

Essential Eight explained

Navigate the Essential Eight maturity model with clear guidance, MITRE ATT&CK mapping, and SIEM-driven practices for real-world compliance.

 
 
 
Ebooks

The cost of Active Directory mismanagement

Expose the hidden costs of AD mismanagement and fix them with proven practices, stronger governance, and unified IAM.

 
 
 
Ebooks

Navigating the Digital Personal Data Protection Act - A comprehensive guide for compliance with ManageEngine solutions

Achieve DPDP compliance by mapping requirements to actionable checklists, consent management, DPIAs, and implementation with AD360 and Log360.

 
 
 
Ebooks

Adopting Zero Trust to safeguard against generative AI cyberthreats

Strengthen defense against generative AI attacks by enforcing Zero Trust principles for identity, access, and continuous verification.

 

Data Sheets

 
 
Data Sheets

Unified identity security, built for modern enterprises

Discover unified IAM that streamlines identity lifecycle, strengthens access with adaptive MFA and secure SSO, and enforces risk‑based governance.

 

Videos

Video Thumbnail
Video zone

Navigate the Future of Access Management

Watch the discussion between ManageEngine and KuppingCole for a holistic view of access management in the age of hybrid identity and AI agents.

 
Video Thumbnail
Video zone

Generative AI and the Future of Identity Governance

Explore how generative AI can modernize identity and access management, strengthen zero trust, and automate identity governance with ManageEngine AD360.

 
Video Thumbnail
Video zone

The Cost of AD Mismanagement: Hidden Risks, Compliance Failures & How to Fix Them

Explore real-world AD mismanagement scenarios, understand their security and operational impact, and see how AD360 helps you detect, remediate, and prevent them.

 
Video Thumbnail
Video zone

Zero Trust on a Shoestring: Prioritizing High-Impact Controls for Immediate Risk Reduction

Discover how to apply Zero Trust principles on a tight budget by prioritizing targeted MFA, privilege access reviews, and automated user lifecycle management.

 
Video Thumbnail
Video zone

Automating Zero Trust: Reducing Labor and Software Costs with Policy-Driven Access Controls

Discover how to replace manual identity workflows with policy-driven automation so you can enforce Zero Trust, cut labor hours, and reduce IAM tool sprawl.

 
Video Thumbnail
Video zone

IAM in the Age of AI-Powered Fraud

Explore how to harden identity systems against AI-driven phishing and account takeover using risk-based MFA, behavioral analytics, access reviews, and automated lifecycle controls in AD360.

 

Blogs

Blogs

What is PCI DSS compliance? Is your organization compliant?

Understand what PCI DSS compliance is, why it matters for cardholder data, and how AD360 supports access control and audit readiness.

 
Blogs

Why should your organization comply with the GDPR?

Understand why GDPR compliance strengthens privacy, improves security posture, and see how AD360 supports access governance, auditing, and data protection by design.

 
Blogs

5 simple steps to HIPAA compliance

Learn the core HIPAA requirements around PHI, follow five practical steps to strengthen security, and see where AD360 supports access control and safeguarding patient data.

 
Blogs

IAM security best practices for PCI DSS compliance

Explore IAM best practices that map to PCI DSS requirements, minimize handling of cardholder data, and strengthen access control, password policies, and encryption in your environment.

 
Blogs

IAM security best practices for GDPR compliance

Explore IAM best practices that help you meet GDPR principles like data minimization, access governance, and privileged access control for EU personal data.

 
Blogs

NIST password guidelines: Bolstering password security

Explain the latest NIST password recommendations, strengthen password and passphrase policies, and align your organization's authentication practices with modern security standards.

 
Blogs

3 ways to protect vulnerable healthcare data from security attacks

Learn three practical ways to secure PHI in healthcare environments, strengthen auditing and insider-threat detection, and use AD360 to support HIPAA and HITECH compliance.

 
Blogs

Why SIEM is the best defense against cyberthreats

Explain how SIEM strengthens threat detection, insider-risk monitoring, and incident response, and see how AD360's identity insights complement SIEM for end-to-end security.

 
Blogs

User and entity behavior analytics (UEBA) explained

Understand how UEBA uses baselining and machine learning to detect anomalous behavior, uncover insider threats, and complement AD360's identity and access security.

 
Blogs

The secret sauce to detect insider threats

Learn how to identify different types of insider threats, reduce human-error risks, and use UEBA and AD360 to spot anomalous behavior before it leads to a breach.

 
Blogs

Insider threats 101: Detect, investigate, and then mitigate

Learn what insider threats look like, detect suspicious user behavior early with UEBA and SIEM, and investigate and mitigate incidents before they cause major damage.

 
Blogs

6 essential capabilities of a modern UBA solution

Explore the six must-have capabilities of a modern UBA solution, from risk scoring and machine learning to integrations and visualization, to strengthen threat detection with AD360.

 
Blogs

What are the risks involved in shadow IT

Understand how unsanctioned apps and BYOD create data, malware, and compliance risks, and learn practical steps to discover, educate, and control shadow IT with AD360.

 
Blogs

Maintain confidentiality of critical information by implementing the POLP

Learn how to apply the principle of least privilege (POLP) across users and roles, minimize excessive permissions, and protect confidential data from accidental or malicious misuse.

 
Blogs

The principle of least privilege explained

Understand the principle of least privilege (PoLP), avoid privilege creep, and use AD360's time-bound permissions and access reviews to reduce insider and lateral-movement risk.

 
Blogs

The rise of adaptive authentication

Explore how adaptive authentication tailors MFA challenges to user risk, reduces login friction, and helps you enforce Zero Trust with context-aware policies in AD360.

 
Blogs

Stay ahead of threats with continuous monitoring

Understand what continuous monitoring is, improve visibility into your IT environment, and use real-time alerts and analytics to detect issues and threats before they disrupt business.

 
Blogs

3 ways to prevent cyberattacks using real-time alerts

Learn three real-time alerting techniques—account compromise traps, rule-based alerts, and AI-driven monitoring—to detect attacks early and contain them with AD360.

 
Blogs

Understanding incident management: processes and importance

Understand what incident management is, follow its key process steps, and see how it helps minimize downtime, improve service quality, and support compliance.

 
Blogs

What is IAM? Guide to identity and access management

Learn the fundamentals of identity and access management (IAM), its core components and use cases, and how IAM protects modern hybrid environments from identity-driven threats.

 
Blogs

What is compliance management?

Understand what compliance management is, why it matters for risk reduction and stakeholder trust, and how a compliance management system streamlines monitoring, auditing, and reporting.

 
Blogs

Hybrid IAM: Securing identities across on-premises and cloud environments

Explore why hybrid IAM is critical for organizations using both on-premises and cloud systems, and learn best practices to secure identities, enforce Zero Trust, and centralize access control.

 
Blogs

Remote workforce enablement: Securing identities and access for work-from-anywhere

Learn how to securely enable a remote workforce using IAM, MFA, SSO, and Zero Trust principles, while maintaining productivity and protecting sensitive data with AD360.

 
Blogs

Identity lifecycle management for secure IAM

Learn how identity lifecycle management automates user provisioning and deprovisioning, reduces regulatory risk, and breaks down silos by integrating HR, help desk, and IAM systems with AD360.

 
Blogs

Role-based access control (RBAC) for identity security

Learn how RBAC simplifies permission management, enforces least privilege at scale, and helps large organizations control access to sensitive data and applications.

 
Blogs

Identity protection with UBA

See how user behavior analytics (UBA) helps detect compromised accounts, privilege abuse, and insider mistakes by baselining normal activity and flagging risky deviations in AD360.

 
Blogs

Identity automation

Learn how identity automation reduces manual IAM effort, cuts provisioning costs, and improves security by standardizing user onboarding, changes, and deprovisioning with AD360.

 
Blogs

Identity threat detection and response: Your all-in-one playbook

Learn what identity threat detection and response (ITDR) is, why identity-centric attacks are rising, and how ITDR works with IAM to detect, contain, and remediate identity breaches.

 
Blogs

Identity security

Learn what identity security means, why identities are the new perimeter, and how capabilities like MFA, SSO, PAM, and UBA in AD360 help stop identity-based attacks.

 
Blogs

Secure your Active Directory: The essential guide to AD risk assessment

Learn what identity risk assessment is for AD, compare major risk methodologies, and see how structured assessments help reduce identity-related risks in your AD environment.

 
Blogs

SASE: What is secure access service edge

Understand what SASE is, how it converges networking and security in the cloud, and why it helps secure remote users, apps, and data with a Zero Trust-ready architecture.

 
Blogs

What is PAM? Guide to privileged access management

Learn what privileged access management (PAM) is, why privileged accounts pose unique risks, and how PAM controls like vaulting, MFA, and just-in-time access reduce insider and breach impact.

 
Blogs

Multi-factor authentication (MFA)

Learn how MFA combines passwords with extra factors like OTPs or biometrics to block account takeover attempts and strengthen your organization's identity security.

 
Blogs

How to implement Zero Trust and its core components with AD360

Understand Zero Trust security, see why perimeter-based models fall short, and learn how to use IAM, MFA, microsegmentation, and continuous monitoring in AD360 to build a Zero Trust architecture.

 
Blogs

5 pain points you can overcome in AD user account management

Discover five common AD user management challenges—from bulk provisioning to stale accounts—and see how AD360 helps automate tasks, enforce least privilege, and reduce security risks.

 
Blogs

Smart strategies to provision and de-provision Active Directory accounts

Learn how template-based user provisioning and de-provisioning streamlines onboarding, transfers, and offboarding while reducing human error and strengthening security with an IAM-driven approach.

 
Blogs

8 steps to effectively manage groups and users in bulk in Active Directory

Follow eight practical best practices to bulk-manage AD users and groups using OUs, security groups, automation, and regular cleanup to save time and close security gaps.

 
Blogs

Why native Active Directory tools are no longer enough for modern IAM

See why built-in AD tools struggle with today's distributed, security-first environments and how third-party IAM solutions like AD360 add automation, stronger security, and better visibility for admins.

 
Blogs

Active Directory clean-up: Should you automate it?

Explore why regular AD clean-up is vital, the risks of stale accounts and groups, and how automating these tasks improves security, saves admin time, and keeps your directory healthy.

 
Blogs

4 AD management mistakes that can weaken your organization's cybersecurity

Learn how everyday admin-account use, poor delegation, weak password policies, and lack of auditing in AD open doors to attackers, and how tightening these practices strengthens cybersecurity.

 
Blogs

What is user provisioning and de-provisioning in AD360?

Understand how user provisioning and de-provisioning create, update, and retire employee accounts across their life cycle, and see how AD360 automates these steps to improve security and compliance.

 
Blogs

Benefits of automating user provisioning and de-provisioning with AD360

Discover how automating provisioning and de-provisioning with AD360 reduces manual errors, accelerates onboarding and offboarding, and enforces least-privilege access across your directory environment.

 
Blogs

Manual vs. automated identity life cycle management

Compare manual and automated identity life cycle management, and see how AD360 uses workflows and HRMS integrations to streamline onboarding, changes, and offboarding while tightening security.

 
Blogs

Conditional access: The what, why, and how

Learn what conditional access is, how it applies Zero Trust principles like explicit verification and least privilege, and how context-aware policies, MFA, and continuous monitoring tighten security.

 
Blogs

How to empower users and save money with self-service password reset technology

See how self-service password reset (SSPR) lets users securely reset their own passwords using alternate authentication methods, cutting help desk costs and improving productivity while enhancing security.

 
Blogs

Enterprise SSO: The antidote to password fatigue

Understand how enterprise SSO reduces password fatigue, strengthens password hygiene, and cuts phishing and brute-force risks by giving users secure one-click access to all their applications.

 
Blogs

What are dictionary attacks and how can you prevent them?

Learn how dictionary attacks exploit weak, common passwords using wordlists and personal data, and see how strong passwords, MFA, and account-lockout policies help block these attacks.

 
Blogs

What is adaptive authentication and how does it work?

Understand how adaptive authentication evaluates context like location, device, behavior, and network in real time to assign risk scores and dynamically choose the right level of authentication.

 
Blogs

What are YubiKeys and how do they work?

See how YubiKeys use public-key cryptography and possession-based authentication to deliver phishing-resistant MFA, enable password-less logins, and secure multiple accounts with a single durable hardware key.

 
Blogs

What is SAML authentication and how does it work?

Learn how Security Assertion Markup Language (SAML) enables single sign-on by letting an identity provider securely assert your identity to multiple applications using signed, standards-based assertions.

 
Blogs

Passwords are dying: The increasing need for MFA

See why password-only security keeps failing, how modern attacks exploit weak and reused credentials, and how multi-factor authentication (MFA) adds critical extra layers of protection.

 
Blogs

Manage expired passwords in your organization

Learn how to design balanced password expiration policies aligned with NIST guidance, train users, and use MFA and self-service tools to handle expired passwords without weakening security or UX.

 
Blogs

Authentication vs. authorization: What's the difference and why it matters

Clarify how authentication proves who a user is and authorization decides what they can access, and learn common methods like MFA, RBAC, and ABAC to strengthen access security.

 
Blogs

3 key benefits of continuous vigilance

Discover how continuous vigilance delivers real-time visibility into your IT environment, speeds incident response, and uses behavior insights to strengthen both security and business performance.

 
Blogs

Conditional Access: How It Protects Your Resources

Learn how conditional access mechanisms evaluate multiple signals to authorize or block user access requests, including step-by-step explanations of signal evaluation and policy enforcement.

 
Blogs

A Comprehensive Guide to U2F Security Keys

Understand how U2F security keys provide phishing-resistant two-factor authentication using physical hardware devices and public-key cryptography to protect user accounts from unauthorized access.

 
Blogs

How SSO Reinforces Password Security

Learn how single sign-on consolidates authentication across multiple applications, reducing password fatigue, minimizing credential exposure, and strengthening overall identity security in enterprise environments.

 
Blogs

The True Cost of Missing Self-Service Password Reset (SSPR)

Discover how SSPR reduces helpdesk costs and downtime by enabling users to securely reset passwords and regain system access independently without IT support intervention.

 
Blogs

What is Remote Access VPN?

Understand how remote access VPNs establish secure encrypted connections, enabling employees and authorized users to safely access organizational resources from remote locations as if connected directly to the internal network.

 
Blogs

The Fall of Passwords

Explore why password-based authentication is becoming obsolete due to increasing security vulnerabilities and how organizations are transitioning to modern technologies like multi-factor authentication and passwordless authentication methods.

 
Blogs

SSO Authentication Mechanisms Explained

Understand the step-by-step flow of single sign-on authentication, from user navigation to identity provider verification and application access token generation, enabling secure multi-app authentication.

 

Awards

Award logo
Awards

Honored once again with 2025 TMCnet’s AI in Cybersecurity Innovation Award!

For the second year in a row, ManageEngine AD360 has been recognized at TMCnet’s AI in Cybersecurity Innovation Awards in the Predictive Analytics for Cyber Threat Prediction category.

 
Award logo
Awards

Recognized as the IAM Innovator of the Year at the ITP.NET Security Awards 2025.

These awards honor the cybersecurity leaders, products, and strategies shaping the future of digital security across the Middle East.

 
Award logo
Awards

ManageEngine continues its winning streak at the Global Infosec Awards

On its 13th anniversary, Cyber Defense Magazine reviewed over 3,000 cybersecurity vendors worldwide and recognized the top 10% with its 2025 Global InfoSec Awards for innovation and forward-thinking defense strategies. AD360 was named a winner in three categories.

 
Award logo
Awards

A winner of the Identity and Access Management category at the Cybersecurity Excellence Awards

The Cybersecurity Excellence Awards spotlight companies, products, and professionals who push the boundaries of innovation and excellence in cybersecurity, ensuring their impact is acknowledged in an ever-evolving security landscape.

 

Analyst Recognitions

Award logo
Analyst Recognitions

A Market Leader in the KuppingerCole Leadership Compass 2025 for Identity Threat Detection And Response (ITDR)

The report highlights AD360’s unified approach, bringing identity access and management, auditing, detection, and recovery together. It also offers a clear view of the ITDR landscape and where identity-centric security is heading.

 
Award logo
Analyst Recognitions

A Major Player in the IDC MarketScape: Worldwide Integrated Solutions for Identity Security 2025 Vendor Assessment

This recognition highlights AD360’s converged approach to IAM, bringing identity governance, access management, identity risk mitigation, and backup and recovery together within a unified platform.

 
Award logo
Analyst Recognitions

Recognized for 3 consecutive years in the Gartner® Market Guide for Identity Governance and Administration

The report highlights AD360, Identity360, and PAM360 as solutions that help organizations make the shift from traditional, siloed identity administration to unified governance, PAM, and cloud identity security as part of a proactive defense strategy.

 
Award logo
Analyst Recognitions

Recognized in the Forrester’s Workforce Identity Security Platforms Landscape, Q4 2025

ManageEngine has been listed along with 32 vendors. The report outlines the competitive landscape for workforce identity security platforms.

 

Courses

Courses

ADSelfService Plus Starter Kit

Learn to enable secure self-service password resets, account unlocks, and profile updates, reducing help desk load while improving user experience.

 
Courses

ADManager Plus Starter Kit

Learn to simplify Active Directory user and group management with best-practice workflows, reports, and automation for day-to-day administration.

 
Courses

ADAudit Plus Starter Kit

Learn to monitor and audit critical AD changes, logons, and file access events, building a strong foundation for security and compliance reporting.

 
Courses

M365 Manager Plus Starter Kit

Learn to centrally manage and report on Microsoft 365 services, streamlining administration across Exchange Online, Entra ID, SharePoint Online, and Teams.