Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory can turn into pain in the neck for IT admins. For instance, if an OU that contains “User Accounts” is...
Infrastructure
May 4, 2016
May the 4th be with you, brave IT pros, geeks and nerds. It's our day! We've collected useful materials to arm you with powerful tools and guides that are designed to help IT Pros gain...
Infrastructure
April 22, 2016
Using shared mailboxes in Office 365 can facilitate communication in team projects. However, giving multiple users access permissions for the same mailbox increases the risk of security incidents and...
The year of 2015 became notorious for data breaches compromising on average more data than ever before. Any security breach is a result of security gap, negligence, or underestimation of human...
Compliance
October 12, 2015
Imagine a world where all IT systems run just as they were once configured, and nothing bad happens to them – or nothing at all, for that matter. There is nobody who comes into your office...
Infrastructure
July 1, 2015
Virtualization is something that has been gaining popularity among IT Pros in past several years, and not without reason. Multiple operation systems and applications can be run on a single server...
Identity
November 7, 2014
Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory almost inevitably lead to trouble for IT departments. Here are some of the most common examples:
if an...
Infrastructure
October 27, 2014
Suspicious software on your Windows Server may be the result of an unauthorized installation by your own employee or originate from a hackers’ attack. Any suspicious software can potentially cause...
Identity
September 11, 2014
The Case problem
There are many users in your organisation who work remotely and do not actually log into a workstation or a laptop directly as such. Instead, they use their Active Directory...
Infrastructure
August 28, 2014
This How-to will help you create automatic reports about created user accounts in domain and send them to an e-mail using PowerShell. Additionally, we will compare this auditing method with the...