Directory and Resource Administrator

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
1,235
Score:
Unrated

From time to time a hardware malfunction, network outage or simple a disaster can occur, so it is a very good idea to have a disaster recovery plan available and updated. This document describes the process of cloning an eDirectory box in a “Offline” fashion. It is very useful when you need to restore a previous eDirectory box that was lost for any reason.

dlugohernandez
Feb 3, 2015
3:23 pm
Reads:
651
Score:
Unrated

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…

+ read more

Renee Bradshaw
Feb 24, 2014
8:59 am
Reads:
1,363
Score:
Unrated

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,779
Score:
5

The Report shows a password age report and calculates the number of days since the password was reset.

jacksonse
By: jacksonse
Jun 29, 2013
8:54 am
Reads:
1,163
Score:
Unrated

While much of the world debates whether Edward Snowden, the 29-year-old contractor who divulged details about the National Security Agency’s (NSA’s) data-collecting programs, is a traitor or a whistleblower, we security types are pondering other types of questions, such as: Will this incident make businesses think twice about holding critical data on servers at cloud hosts…

+ read more

Renee Bradshaw
Jun 28, 2013
2:49 pm
Reads:
13,555
Score:
Unrated

This flash video details how to create a report showing Groups and Membership with User Data by creating a custom report using SQL Views. CreateReportwithSQLView.swf NetIQ does not test or validate any software, code or other materials provided in, on or through NetIQ Cool Solutions (collectively, “Materials”), so please use caution when downloading or accessing…

+ read more

jacksonse
By: jacksonse
May 13, 2013
10:56 am
Reads:
1,005
Score:
Unrated

This script and video details how to batch create ActiveViews using Varset Script. NetIQ does not test or validate any software, code or other materials provided in, on or through NetIQ Cool Solutions (collectively, “Materials”), so please use caution when downloading or accessing any Materials from Cool Solutions and ensure that you have reasonable and…

+ read more

jacksonse
By: jacksonse
Mar 14, 2013
11:29 am
Reads:
1,154
Score:
Unrated

The zip file contains a workflow file as well as flash walkthrough of the workflow.

jacksonse
By: jacksonse
Jan 8, 2013
12:54 pm
Reads:
984
Score:
Unrated

The zip file contains a template workflow as well as Flash Walkthrough for the AD maintenance workflow to automatically clean up stale computer accounts.

jacksonse
By: jacksonse
Jan 7, 2013
3:09 pm
Reads:
1,011
Score:
Unrated