In large organizations, the two basic tasks which are always there for IT help desks are: account unlock and password…
It appears nowadays that newspapers essentially have to carry some news on pickpocketing, cellphone and vehicle thefts, ATM robberies, kidnapping,…
Many Exchange administrators are very much aware of the security threats posed by unused or stale AD accounts-both user accounts…
Just like our homes, Active Directory needs regular cleaning. We need to find the unused user accounts, computer accounts etc.…
HIPAA stands for the Health Insurance Portability and Accountability Act, and is a set of mandates that were introduced to…
Automate cleanup of unwanted user and computer accounts Inactive user accounts in your Active Directory are just like an open…
Compliance auditing can be loosely defined as the process of systematically examining the books of records, the business processes and…
MS SQL Server, a popular database management system from Microsoft, is widely used by organizations to store their data and…
IT security auditing consists of creating quantifiable assessments of IT assets such as servers, client computers, hardware assets, applications running…