IAM AND IT SECURITY NEWSLETTER
 
ISSUE 145 | DECEMBER 2025
 
 
 
 
Top 8 Active Directory audit
reports to share with your CISO
 
Discover the top 8 AD audit reports every CISO should track. Improve visibility with executive-level AD reports and outpace native tools.
 
Grab your copy
 
 
 
 
ADManager Plus
 
Is AD management slowing down your team's response time?
 
Complex menus waste precious time on routine AD tasks. Zia's AI assistant uses simple chat commands to unlock accounts, generate reports, and spot security anomalies instantly.
 
Try Zia now
 
 
 
M365 Manager Plus
 
Top 10 Entra ID reports admins should check daily
 
Check out the crucial Entra ID reports you need to spot risky changes fast, catch issues in their infancy, and elevate your Microsoft 365 security capabilities.
 
Keep up with your cloud
 
 
 
Log360
 
Quick review of Log360 on Gartner Peer Insights = $25 gift card
 
Help other security teams strengthen their defenses by sharing feedback on Log360. Share how the solution has enhanced threat detection, investigation, and response. The review process is quick—it takes roughly 7 minutes.
 
Click to start
 
 
 
AD360
 
Quick review of AD360 on Gartner Peer Insights = $25 gift card
 
Got a moment? Share how AD360 has helped simplify identity governance, access control, and compliance to help shape others' decisions! It’s quick, easy and takes just 7 minutes!
 
Click to start
 
 
 
SharePoint Manager Plus
 
Audit every SharePoint file change
 
Stay on top of file permission changes, edits, shares, and renames across hybrid SharePoint. Track who made the change, when it happened, and what was modified.
 
Start tracking now
 
 
 
RecoveryManager Plus
 
Simplify disaster recovery with RecoveryManager Plus
 
Craft a resilient disaster recovery strategy with RecoveryManager Plus and keep your enterprise data protected from any disruption.
 
Craft your strategy
 
 
 
ADSelfService Plus
 
Stronger identity control for air-gapped networks
 
Enable strong authentication in isolated environments with offline MFA. Prevent unauthorized access and secure critical systems without relying on internet connectivity.
 
Reinforce security
 
 
 
DataSecurity Plus
 
Government data is more exposed today than ever
 
State and federal institutions face data sprawl, legacy systems, and rising threats. See how to gain clarity, reveal weaknesses, and safeguard essential files
 
Improve data visibility
 
 
VIDEO VAULT
 
  Log4j, the vulnerability that opens the door for malicious actions.  
 
This Java-based logging utility is one of the top-profile security risks with a severity level of 10. Learn more about Log4j, how is it exploited and ways to fix it in 3 minutes.
 
Watch Now
 
 
SUCCESS STORY
 
  With ADAudit Plus, KEKST CNC is now ready to be TISAX certified!  
 
With ADAudit Plus and TISAX certification, discover how KEKST CNC is now expanding their business services to the automotive industry.
 
Read now!
 
 
 
  Update to Latest build  
  ADManager Plus  
  ADAudit Plus  
  ADSelfService Plus  
  EventLog Analyzer  
  Exchange Reporter Plus  
  RecoveryManager Plus  
  SharePoint Manager Plus  
  M365 Manager Plus  
 
 
 
  Upgrade your Product  
  ADManager Plus  
  ADAudit Plus  
  ADSelfService Plus  
  EventLog Analyzer  
  Exchange Reporter Plus  
  RecoveryManager Plus  
  SharePoint Manager Plus  
  M365 Manager Plus  
 
 
 
  Renew your Product  
  ADManager Plus  
  ADAudit Plus  
  ADSelfService Plus  
  EventLog Analyzer  
  Exchange Reporter Plus  
  RecoveryManager Plus  
  SharePoint Manager Plus  
  M365 Manager Plus  
 
 
Our Products
 
ADManager Plus | ADAudit Plus | ADSelfService Plus | Exchange Reporter Plus | EventLog Analyzer
Log360 | AD360 | Log360 Cloud | M365 Manager Plus | DataSecurity Plus | Recovery Manager Plus
SharePoint Manager Plus | Identity360
 
IAM handles
Facebook X Linkedin YouTube Instagram
SIEM handles
Facebook X Linkedin Instagram
 
 
 
https://stratus.campaign-image.com/images/iam-it-security-newletter_zc_v2_15_54907001715225440.png Help us improve
 
 

Unveiling NanoCore Remote Access Trojan

×