Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netwrix

Exploiting Weak Active Directory Permissions with PowerSploit

Adversaries use multiple techniques to identify and exploit weaknesses in Active Directory (AD) to gain access to critical systems and data. This blog post explores 3 ways they use PowerShell PowerSploit to elevate or abuse permissions, and offers effective strategies for protecting against them.

Netwrix Usercube: Securing Your Identities to Secure Your Data

Do you know exactly who in your organization has access to which process and why? Netwrix Usercube optimizes and systematizes Identity Governance and Administration and stays with you to make your daily life easier. This SAAS editor leaves you in control of managing and changing who accesses what and when.

SharePoint Activity Monitoring: How to Do It and What to Look For

Monitoring SharePoint Server activity is vital to knowing who is accessing your SharePoint sites, services and content and how they’re using your system. Tracking SharePoint performance monitoring metrics can help you identify potential problems in time to stop them from negatively affecting your business. You can also use tracking activity to monitor the adoption and usage rates of SharePoint and determine areas that need improvement.

Top 5 Vulnerability Management Best Practices

The transition to hybrid IT architectures and remote work strategies has greatly expanded the IT estates of most organizations in recent years. Couple this expansion with the growing number of computing and IoT devices that connect to company networks today and you understand why cybersecurity is a growing challenge: As your IT footprint grows, so does your attack surface.

How to Restore Active Directory Object Attributes

Active Directory (AD) is a database and set of services that offers centralized management of IT infrastructure resources. It connects users with the resources they require to get their work done. Therefore, technicians must be able to quickly check and recover AD attributes that are modified or deleted by hardware failures, cyberattacks, scripting mistakes and other problems.

Reset Password via Set-ADAccountPassword Poweshell Cmdlet

Users normally update their domain account passwords using the Windows Settings menu. But if they forget their password or their account is disabled, an administrator needs to step in. This blog post explores several ways that an admin can reset a user’s password or create a new one. First, we review the easiest options: Active Directory Users and Computers (ADUC) and Active Directory Administrative Center (ADAC).

Best Practice Tips for Better SharePoint Site Security

Microsoft SharePoint is one of the most popular platforms for collaboration and content sharing within internal teams and even with external users. Therefore, ensuring SharePoint security is vital to helping your company avoid costly data breaches and business disruptions. This article details the key best practices for protecting your SharePoint sites, whether you are using on-prem SharePoint Server or SharePoint Online version.

External Sharing in SharePoint: Tips for Wise Implementation

Microsoft SharePoint enables users to share files with coworkers in just a few clicks. However, external sharing is just as easy— which puts the security of your sensitive data at risk. To help you control external sharing of files and folders without interfering with legitimate collaboration, this article details the external sharing settings available in the Microsoft administrative interfaces and offers best practices for configuring them.

How to Install TLS/SSL Certificates in NetApp ONTAP

HTTPS is the standard method for internet communications that transmit sensitive data. The TLS protocol is the backbone of HTTPS, encrypting connections so transmitted information can’t be intercepted or modified. HTTPS should also be used with local web applications that transmit sensitive data. This includes NetApp servers, since external applications and users need to authenticate, authorize and transfer data with the NetApp ONTAP operating system.