If you’re like most IT organizations, AD groups are one of those tasks that are “set it and forget it.” But after years of neglect, you’re now in charge of massive numbers of groups with no documentation, rampant security issues, and the charge to get it organized to meet security and compliance objectives.
So, what steps should you take to get groups under control?
In this recorded webcast, join industry expert and founder of Techvangelism, Nick Cavalancia, and Jonat
Everyone’s got them – Insiders. Some have only been here a few days, and others more years than even you. And, technically, you’re the ones enabling them to access critical data, sensitive intellectual property, customer lists, and more… all through the simplest of AD management tasks – group memberships. So are insiders (that is, your users) a problem and is IT adding to that problem when it comes to insider threats? Not every Insider is a problem. And not every IT departmen
By your even looking at this blog post, it’s a safe assumption that you’re planning on going (or are already going) through a migration or are preparing for a disaster. With Active Directory being the crux of so many critical systems, you need your plan to be as close to reality as possible to ensure a successful migration or recovery. So how can you best prepare for any unforeseen contingencies in a way that doesn’t take up all your time and focus? In this webcast sponsored
It’s likely today that you’ll need to recover a single user account, an email, a database, or a file – far more than you’ll need to recover all of Active Directory, Exchange, SQL Server, or SharePoint – and yet, your backup and recovery strategy focuses on recovering the enterprise, and not daily recovery needs of that enterprise. In this recorded webcast, sponsored by Veeam, I discuss what’s possible from a technology standpoint – both with the product you wish to recover fr
Today's Active Directory (AD) requires so much more than simply creating a few groups and resetting passwords. The introduction of Azure AD essentially forces you to manage two environments. Incorporating this identity and access management cloud technology increases the reliance on DNS for connectivity, and means you must give special attention to the reliability and availability of this service. Plus, as more applications are exposed to the web, you need to manage the lifec