• How File Server Auditing Can Help Prevent Insider Threats

    Every year, insider threats consistently seem to represent one of the biggest risks to IT security for organizations all over the world. The problem is not going away any time soon. In fact, the annual Insider Threat Report revealed that a staggering 90% of those surveyed felt that they were vulnerable to insider attacks. On top of this, the biggest single risk factor contributing to the rise of insider threats was excessive access privileges.
  • Top 5 Free Microsoft Outlook OST Viewers

    Outlook OST Viewers are used to view, read and open even corrupt or damaged Outlook OST files. These tools give a preview of your complete OST items such as mail, calendar, notes, etc., just in a few clicks.
  • Planning an Active Directory backup and restoration

    Backing-up and restoring Active Directory can be a painful task, and it's not easy to know where to start. This goal of this article is to provide a brief overview of the Active Directory backup and restoration process. 
  • How to use PowerShell to migrate mailboxes from one database to another in Exchange 2013

    Migrating Exchange mailboxes between databases is not your every-day task, and administrators can therefore find themselves spending an inordinate amount of time troubleshooting or re-distributing mailboxes across the databases. In this article, we will show you how to move mailboxes from one database to another in Exchange 2013 using
  • Top 10 Group Policy Audit Reports with LepideAuditor Suite

    Group Policy is a fundamental element of an organization’s security policy. Even small unwanted changes to security policies, software deployment, desktop configuration or other settings can severely impact security, systems management and compliance.