AD Auditing
How to Spot which Users are Logged in and Track their Logon/Logoff times
How to Track User Logon and Logoff Events in Active Directory User logon and logoff are events that happen on an everyday basis in an organization. Administrators need to track the user logon and logoff activities as these events also play an ...
Battle Test Your GDPR Plan
GDPR compliance auditing will be new to many organizations that have never been under a compliance regulation before. Therefore, many of the logistics around the preparation, ongoing compliance, and audits related to the GDPR will be foreign. One of ...
Active Directory Auditing and Monitoring: What's the Difference
Active Directory Auditing vs Active Directory Monitoring IT administrators often tend to think that auditing and monitoring are one and the same. If you've held on the same notion, you are not entirely wrong. However, there are a few key differences ...
Configure Alerts when Shares are Created on a Server
We all know that sharing a folder on a server opens up an entry point to that server. Even if the share for the folder is hidden (by adding a $ to the share name), nearly anyone on the network can discover the share. Being notified when a share is ...
Preparing for the GDPR: Designing Active Directory groups
One aspect of the GDPR is the fact that all users who have access to personal data must be monitored. As a best practice, only groups should be placed on the access control lists (ACLs) of personal data, not individual users. Therefore, it is the ...
How to Monitor Active Directory Security Group Membership Changes
How to Detect Security Group Membership Changes It is a recommended security practice for administrators to keep track of membership changes made to security groups. If this event is not tracked, an attacker might join a security-enabled group and ...
How to See Who Changed File Permissions in Windows Servers
Finding Permission changes on File Servers Tracking user rights changes on Windows Servers is important because these changes can lead to unauthorized access and ultimately data exfiltration. IT administrators, therefore, must track permission ...