Quantcast
Channel: Jeff Melnick – Netwrix Blog | Insights for Cybersecurity and IT Pros
Browsing all 100 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Securing File Servers: All You Need to Know

What does the war against data breaches have to do with security of file servers? Well, almost everything. Whole lot of companies have been using file servers to store all kinds of information,...

View Article



How to Track Who Deleted Files on SharePoint

View Article

How to Detect Password Changes in Active Directory

View Article

How to Detect Unauthorized SQL Database Changes

View Article

How to Detect Who Changed the File or Folder Owner

View Article


Record All Changes to Your Windows Server

View Article

How to Detect User Account Deletion in Active Directory

View Article

Image may be NSFW.
Clik here to view.

SysAdmin Appreciation Day 2015: Power2ITGuyz Contest

Today we launch a worldwide contest for system administrators to honor IT Pros and give out some prizes – SysAdmin Appreciation Day is soon to be upon us. So join us in celebration by supporting the...

View Article


Image may be NSFW.
Clik here to view.

System Administrators Blowing Off Steam in a Celebratory Contest

The role of system administrators is often unjustly underestimated, people only think of them when something is on fire – hopefully, just metaphorically, but who knows. Understanding, that your...

View Article


Monitor All User Logons in a Domain

View Article

Who Disabled a User Account in Active Directory

View Article

Image may be NSFW.
Clik here to view.

How Should IT Handle User Termination

Employment termination, as well as taking aboard the new hires, is an ongoing process for every organization. People get fired, quit/resign, replacements are found – it’s a never-ending story. IT...

View Article

Detect Who Read a File on a File Server

View Article


How to Detect Who Unlocked a User Account in Active Directory

View Article

Image may be NSFW.
Clik here to view.

Top 7 IT Security Threats for 2016

While the number of announced data breaches in 2015 is lower compared to 2014, the number of compromised accounts increased dramatically, exposing more personal data than ever before. Among the top...

View Article


5 Jedi IT Security Tenets To Defend Against Data Breaches

Star Wars is not just a cultural phenomenon, it is a story that can be interpreted in many ways, even as a data breach case.  The everlasting battle between hackers and IT pros very much resembles the...

View Article

Image may be NSFW.
Clik here to view.

2015 Cloud Security Survey: Security Concerns about Migration to the Cloud

Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, released the results of its global 2015 Cloud Security Survey...

View Article


Image may be NSFW.
Clik here to view.

Top 10 IT Security Conferences in 2016

One of the best ways for those interested in IT leadership in security to advance their professional skills is to attend world-class conferences. I have put together a list of US IT Security...

View Article

SysAdmin Magazin February 2016: Cybersecurity

View Article

Image may be NSFW.
Clik here to view.

How to Detect Who Disabled a User Account in Active Directory

Users whose accounts have been disabled, either accidentally or maliciously, are unable to log into IT systems using Windows authentication. Those who are already logged in might experience problems...

View Article
Browsing all 100 articles
Browse latest View live




Latest Images