Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.

The Building Company: "Building" the future with OpManager

The Building Company serves the full spectrum of the construction industry including the residential, commercial, and industrial markets. The retail activities of the company are provided through 124 outlets throughout Southern Africa. Operations are located in major centers in South Africa, Namibia, Botswana, and Swaziland, and are managed as either corporate, joint venture, or franchise stores.

6 ways to use analytics to deliver an exceptional end-user experience: Part 2

Welcome to the second part of our three-part blog series on leveraging analytics to deliver an exceptional end-user experience. In the last part, we discussed two key points: how to gauge the effectiveness of your support forms using analytics, and how to pick the right metrics that focus on customer satisfaction. In this part, we’ll discuss the next two ways analytics can help you deliver an exceptional end-user experience.

Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues to make headlines despite its lack of sophistication. It has become the attack method of choice for cybercriminals primarily because of its high success rate and ROI.

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior through machine learning techniques. By using that information, you can identify anomalies and protect your network from cyberattacks.

Why every IT admin needs a hardware monitor, and what it can do for your organization's business continuity

The ITIC 2020 Global Server Hardware, Server OS Reliability Report released in April found that reliability declined in 67 percent of servers over four years old when corporations failed to retrofit or upgrade the hardware to accommodate increased workloads. This highlights the pressing need for hardware monitor solutions and the need for immediate alerting mechanisms to ensure the longest possible lifespan for hardware.

ManageEngine Insights - Building resilience with cloud transformation

Amidst the complexity of today's dynamic market landscape, the cloud has emerged as a reliable technology whose benefits are far-reaching and long-lasting. Despite COVID-19 affecting global IT spending, companies have continued to invest in cloud solutions. Be it making the business more agile or accelerating their digital transformation goals, companies are turning to the cloud for a variety of reasons.

5 key benefits of using an IP scanner

In todays IP-centric world, it’s becoming increasingly complex to support network-intensive adaptations like cloud adoption and bring your own device (BYOD) polices. As an IT admin, you’re responsible for scanning and tracking your IP resources to ensure that network devices and end users can be allocated unique IP addresses to access your network.

6 ways to use analytics to deliver an exceptional end-user experience: Part 1

The rules of customer engagement have changed drastically in the last decade, not only for direct customer-facing roles but also for internal customer-facing roles such as technical service team staff, NOC admins, and more. Organizations across the globe are now fully aware that great customer service from support teams and NOC teams can have a lasting impact on employee productivity, morale, and in turn, the organization’s overall revenue churn and growth.

Fast-track bulk Microsoft 365 object creation with M365 Manager Plus

User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts in bulk. Errors made in the user provisioning process will result in frustrated users calling the service desk to request permission to access resources, to be added to the appropriate groups, to update missing profile details, etc. Why provisioning users through the Admin Center is inefficient.