Part 1 of my series explained why your efforts to secure your organization is a matter of national security – protecting the intellectual property (IP) that makes your company successful and bolsters your nation’s economy and ultimate security.…
Part 1 of my series explained why your efforts to secure your organization is a matter of national security – protecting the intellectual property (IP) that makes your company successful and bolsters your nation’s economy and ultimate security.…
DC in the cloud
There could be many different reasons that require Domain Controller running in the cloud:
Extra... extra… read all about it!
Data Breaches are the New Reality! Are you Prepared?
It's no surprise (yet frightening) that there is a drastic increase in news headlines that emphasize the security risks and challenges IT professionals face…
Welcome back to this series of blog posts on cybersecurity lessons learned from 2018. In my previous post, I covered the Meltdown and Spectre vulnerabilities. Today, let’s turn our attention to a persistent thorn in the side of the security world, Adobe…
In my first post in this series, I explained what Active Directory is and what it’s used for. In the next post, we explored Active Directory management. Now let’s dig into Active Directory security and compliance. What do you need to do to…
More and more organizations are migrating to Office 365 — and with good reason. The platform ensures that your workforce always has access to the familiar Office word processing, data analysis, communication and productivity tools they know and depend…
In my previous blog post, I explored the first step in mitigating the insider threat — understanding and controlling privilege across the environment — and reviewed how Quest Enterprise Reporter Suite, Security Explorer and Change Auditor
…IT security predictions are a dime a dozen nowadays, but, for Windows and Office 365 professionals, what you really want is a glimpse into the future for ALL aspects of your role: security, scripting, reporting, provisioning, auditing, migrating and…
The 2018 EDUCAUSE Annual Conference in Denver October 30–November 2 promises to be quite an event, with over 300 sessions and more than 700 presenters. While you’re in the mile-high city, don’t miss the opportunity to discover how to take your cyber…
If you’re attending Microsoft Ignite in Orlando, it’s about that time to dive into the MyIgnite Schedule Builder to select the sessions you want to attend.
Here’s one Active Directory best practices session you won’t want to miss!…
Active Directory is at the heart of it all, providing authentication and authorization for critical resources across your on-premises, cloud and hybrid IT environments. Whether you’re running AD, Azure AD or both, Quest has the deep expertise you need…
Wouldn’t it be great if you could set up your IT environment in just the right way to ensure ongoing security and regulatory compliance? You’d put your firewalls and antivirus protection in place, ensure that all user and computer accounts are granted…
Has your company been hit by ransomware yet? How about other types of malware? Phishing scams, drive-by downloads or pass-the-hash attacks? If you haven’t already, you probably will be soon.
What do all these attacks have in common? They start…
Accounts with excess privileges is a common issue for today’s organizations. Scaling back these permissions is often a challenge. You need data to back up why a certain account is over privileged for its purpose within the organization. Change …
For most circumstances using Recovery Manager for Active Directory to revert changes made to Active Directory is pretty simple. If we need to revert a group's membership, we just search for the group from the selected backup and restore it from an appropriate…
Established over 13 years ago, with more than 5,000 customers and 149 million users audited.
So it comes as no surprise that Quest® Change Auditor is a People’s Choice Stevie® Award winner.
The People’s Choice Stevie® Awards for Favorite…
Being an IT administrator can be an enjoyable, rewarding job. So is parenting, for that matter. But being an IT administrator can also be incredibly stressful with frequent hair-pulling moments. Again, those amongst us that are parents no doubt share…
Voting is underway for the 2018 People's Choice Stevie® Awards and this is a shameless plug to drum up support for some of Quest products that we’ve been pouring our blood, sweat and tears into for the past year. Since the Stevie Awards is a community…
In my previous blog posts, I gave two examples of a privileged user could easily hose your Active Directory: by changing deny logon rights and by erasing the DNS entries on a domain controller.
You might be thinking those are just hypothetical scenarios…
In my previous blog post, I brought up a subject many of us would just as soon not think about: how easily a privileged user can totally hose your Active Directory. I described one method there (changing deny logon rights) and promised two more. Ready…
Not long ago, I was talking to an IT pro whose Active Directory went down suddenly one day. He couldn't determine the root cause, so this was his recovery plan:
Reboot, restore, and then resign.
While not all IT pros will be quite so ready to fall…