For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Follow auditing best practices

Follow auditing best practices 02:21
Learn the simple strategy to find sensitive data in record time when you watch this video from CBR. You'll gain expert insight to help you understand what data you need to protect and where it resides. You'll also learn how to set up audit policies and scan databases automatically.

Related videos

Migrate, modernize and protect AD with Quest
Migrate, modernize and protect AD with Quest

When you need to migrate, modernize or boost cyber resilience for Active Directory, Entra ID and Microsoft 365, you can count on Quest Software solutions.

Accelerating AI adoption with Microsoft and Quest
Accelerating AI adoption with Microsoft and Quest

In this video, Quest GM and President John Hernandez shares his excitement about the rapid adoption of AI in both consumer and business environments. He references the unprecedented speed at which AI platforms like ChatGPT have gained users compared to other technologies. The discussion touches on how AI is transforming various business areas, including customer support and security operations. Hernandez highlights the opportunities this creates for changing work environments securely, aligning with Microsoft's priority on security. The video underscores the potential of AI to revolutionize business operations and the importance of leveraging this technology responsibly.

Why invest in Active Directory?
Why invest in Active Directory?

Colin Truran (Technology Strategist, CTO Office - Quest), goes beyond the stock answer of "it's the key to your kingdom" and explains why investing in Active Directory is vital to your organization's continued productivity and growth.

Top 5 Office 365 & Azure AD Security Events to Monitor During COVID-19
Top 5 Office 365 & Azure AD Security Events to Monitor During COVID-19

With the increase in Microsoft cloud usage by remote workers, it's important to know which Office 365 and Azure AD security events to monitor. Learn more.

TEC Talk: Office 365 - Guard the Galaxy of your Email Users
TEC Talk: Office 365 - Guard the Galaxy of your Email Users

Microsoft MVP and The Experts Conference speaker, Susan Bradley, discusses the tools you need to have in place to identify and protect yourself from business email compromise.

TEC TALK - Office 365 & Azure Active Directory Security | Quest
TEC TALK - Office 365 & Azure Active Directory Security | Quest

Learn how to prioritize Office 365 & Azure AD security for your remote workforce in this TEC Talk presented by Microsoft Certified Master, Sean Metcalf.

TEC Talk: Hardening Privileged Access
TEC Talk: Hardening Privileged Access

Learn steps you can take to secure privileged Active Directory access.

Quick and secure Microsoft infrastructure management and migration
Quick and secure Microsoft infrastructure management and migration

More than 180 million users have trusted Quest solutions to migrate, manage and secure data across their Active Directory, Exchange, SharePoint, Skype for Business and Office 365 platforms. Whether your platforms are on-premises, in the cloud or hybrid, Quest solutions make infrastructure migration and management easy – so you spend less time on maintenance and more innovation.

Questions for Managing Office 365 License Costs | Quest
Questions for Managing Office 365 License Costs | Quest

As the surge in remote workers continues to grow, learn how to manage Office 365 license costs by answering a few of these questions.

Quest Solutions: Helping customers achieve true IT resilience now.
Quest Solutions: Helping customers achieve true IT resilience now.

Quest helps you achieve true IT resilience. We create and manage the software that makes the benefits of new technology real, and the outcome assured.

Quest SaaS Management for Hybrid AD and Microsoft 365
Quest SaaS Management for Hybrid AD and Microsoft 365

How do you simplify managing hybrid environments in the face of a growing Microsoft 365 attack surface? IT expert and Microsoft MVP Paul Robichaux explains.

Protect Your Multi-Tenant Environment
Protect Your Multi-Tenant Environment

One error in a command script can compromise an environment.

Prepare Against Evolved Ransomware Attacks
Prepare Against Evolved Ransomware Attacks

Cybercriminals have changed their ransomware strategy to expose their target’s vulnerabilities.

Plan Ahead to Avoid AD Disaster
Plan Ahead to Avoid AD Disaster

Recovery plans and backups will help companies avoid AD disaster.

Overcoming Teams governance and adoption challenges
Overcoming Teams governance and adoption challenges

Join Microsoft experts as they discuss how you can overcome governance and adoption challenges of Teams.

Related products

InTrust
InTrust

Securely collect, store and receive event data from Windows, Unix and Linux systems

Download Free Trial

Change Auditor for Active Directory
Change Auditor for Active Directory

Ensure security, compliance and control of AD and Azure AD.

Download Free Trial