Directory and Resource Administrator

In this article I will show a fourth method of creating an Aegis workflow to notify Active Directory users that their password will expire in X days, this time using an official adapter. Method #1 was a very simple workflow based off a single script which performed all the automation tasks. Method #2 replaced the…

+ read more

Martin Cotter
Mar 28, 2016
2:26 pm
Reads:
551
Score:
Unrated

A quick scan through your daily email or favorite news site brings news of yet another data breach, inevitably brought on by either a mysterious hacker, organized cyber-criminal group or even a malicious insider. What do all of these identities have in common? In more and more cases, these identities have gained and misused privileged…

+ read more

Renee Bradshaw
Sep 25, 2015
10:36 am
Reads:
1,461
Score:
Unrated

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
1,927
Score:
Unrated

From time to time a hardware malfunction, network outage or simple a disaster can occur, so it is a very good idea to have a disaster recovery plan available and updated. This document describes the process of cloning an eDirectory box in a “Offline” fashion. It is very useful when you need to restore a previous eDirectory box that was lost for any reason.

dlugohernandez
Feb 3, 2015
3:23 pm
Reads:
1,494
Score:
Unrated

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…

+ read more

Renee Bradshaw
Feb 24, 2014
8:59 am
Reads:
1,872
Score:
Unrated

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
2,601
Score:
5

The Report shows a password age report and calculates the number of days since the password was reset.

jacksonse
By: jacksonse
Jun 29, 2013
8:54 am
Reads:
1,728
Score:
Unrated

While much of the world debates whether Edward Snowden, the 29-year-old contractor who divulged details about the National Security Agency’s (NSA’s) data-collecting programs, is a traitor or a whistleblower, we security types are pondering other types of questions, such as: Will this incident make businesses think twice about holding critical data on servers at cloud hosts…

+ read more

Renee Bradshaw
Jun 28, 2013
2:49 pm
Reads:
14,106
Score:
Unrated

This flash video details how to create a report showing Groups and Membership with User Data by creating a custom report using SQL Views. CreateReportwithSQLView.swf NetIQ does not test or validate any software, code or other materials provided in, on or through NetIQ Cool Solutions (collectively, “Materials”), so please use caution when downloading or accessing…

+ read more

jacksonse
By: jacksonse
May 13, 2013
10:56 am
Reads:
1,496
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow