Directory and Resource Administrator

I am often asked by my boss, hey can you tell me if AppManager is capable of monitoring ADFS? I used to tell him that yes it can be done, but there is no module for ADFS rather the base infrastructure that can be used for monitoring. This is an interesting scenario for times when…

+ read more

Anmol Rastogi
Dec 15, 2016
12:58 pm
Reads:
624
Score:
5

In this article I will show a fourth method of creating an Aegis workflow to notify Active Directory users that their password will expire in X days, this time using an official adapter. Method #1 was a very simple workflow based off a single script which performed all the automation tasks. Method #2 replaced the…

+ read more

Martin Cotter
Mar 28, 2016
2:26 pm
Reads:
1,064
Score:
Unrated

A quick scan through your daily email or favorite news site brings news of yet another data breach, inevitably brought on by either a mysterious hacker, organized cyber-criminal group or even a malicious insider. What do all of these identities have in common? In more and more cases, these identities have gained and misused privileged…

+ read more

Renee Bradshaw
Sep 25, 2015
10:36 am
Reads:
2,573
Score:
Unrated

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
2,615
Score:
Unrated

From time to time a hardware malfunction, network outage or simple a disaster can occur, so it is a very good idea to have a disaster recovery plan available and updated. This document describes the process of cloning an eDirectory box in a “Offline” fashion. It is very useful when you need to restore a previous eDirectory box that was lost for any reason.

dlugohernandez
Feb 3, 2015
3:23 pm
Reads:
2,385
Score:
Unrated

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…

+ read more

Renee Bradshaw
Feb 24, 2014
8:59 am
Reads:
2,380
Score:
Unrated

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
3,036
Score:
5

The Report shows a password age report and calculates the number of days since the password was reset.

jacksonse
By: jacksonse
Jun 29, 2013
8:54 am
Reads:
2,104
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow