ADAudit Plus | September 29, 2022See your estimated ROI when you automate IT audit report generation with ADAudit Plus In an IT environment, audit reports need to be generated to meet various security and...
ADAudit Plus | June 13, 2022How ADAudit Plus helps you assess your exposure to Follina (CVE-2022-30190) The recently discovered Windows zero-day vulnerability continues to make news as threat...
ADAudit Plus | November 26, 2021ADAudit Plus' year in review 2021 has been a feature-packed year for ADAudit Plus. Having rolled out an array of new...
ADAudit Plus | November 3, 2021What causes repeated account lockouts and how to resolve them A stringent account lockout policy is vital to derail password guessing and brute-force...
ADAudit Plus | March 24, 2021Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book] User logon activity needs to be audited to meet various security, operational, and...
ADAudit Plus | February 27, 2020IT security: Keep calm and monitor PowerShell In our last release of the PowerShell security series, we talked about how PowerShell...
ADAudit Plus | February 17, 2020Is your business PCI DSS compliant? How Chooseus Life Insurance lost its customers' cardholder details and their trust In...
ADAudit Plus | September 6, 2019NTLM vulnerabilities that make you susceptible to relay attacks In June 2019, Microsoft released patches for two critical vulnerabilities that were...
ADAudit Plus | August 8, 2019Find out which of your employees pose the greatest security risk Among the different types of cyberattacks, insider threats are the hardest to track and...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...