Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced technical knowledge of domains and networks was a requisite. Over time, with the advent of open-source pen testing tools, the knowledge gap and the complexities involved to carry out a full-scale cyberattack have narrowed drastically.

System extensions are replacing macOS kernel extensions. How will this affect you?

From the outset, Apple has been keen to protect user privacy and security, and deprecating kernel extensions is one of the company’s latest moves towards modernizing its platform. As part of Apple’s sustained effort to make macOS a more reliable and secure platform, the tech giant announced at WWDC 2019 that kernel extensions are going to be replaced in macOS Catalina with Apple’s new technology, system extensions. But, why should you care? Let’s explore now.

Microsoft Teams and OpManager: The perfect team for your remote IT management game

It seems almost everything is going digital during this pandemic: businesses, education, and medical consultations. This increased digital consumption is squeezing the juice out of the IT infrastructure of many organizations. On top of that, remote work policies are posing serious security issues. At times like these, IT infrastructure monitoring is like a football game for IT admins, except: So how do you navigate all these challenges and score a touchdown?

Five worthy reads: The evolving employee experience

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore how the employee experience is evolving with the new normal. The employee experience (EX) isn’t about ping pong tables or bring-your-pet-to-work days anymore. The new normal of working remotely has brought in a paradigm shift in the way businesses and employees operate.

How to ensure a seamless end-user experience: The ITOM Podcast [Episode 6]

The ITOM Podcast is back with an all new episode aimed to alleviate all your remote work woes in your IT environment. In the last episode, we discussed in detail about the need for compliance checks, major causes of compliance violations across industries, and the solution to help maintain network compliance. This week, we’ll dive into the end-user experience in this era of remote work.

Leveraging behavior analytics and machine learning algorithms in your PAM strategy

Modern technologies like machine learning (ML) algorithms can introduce a forward-thinking outlook to privileged access management (PAM) and enable enterprises to predict emerging access risks in real time. ML-based anomaly detection systems can deeply analyze raw data collected around privileged activity, profile standard user behavior patterns, and then surveil future operations to detect any deviations from the norm, such as server logins after office hours.

How to monitor IIS effectively

Microsoft Internet Information Services (IIS) is a popular web server for hosting web applications and is widely used in many sectors, such as healthcare, banking, e-commerce, logistics, etc. The IIS web server is the backbone of many IT infrastructures. But if the IIS web server encounters problems, it can lead to websites and applications experiencing higher response times, and timeouts resulting in end-users either leaving your website or complaining about the performance.