Identity Security Risk Assessment
Get a free AD security assessment to evaluate your environment and identify the most actionable issues.
Related Articles

Monitoring Workload – Heads or Tails, it’s two sides of the same coin
I often get asked about monitoring SQL workload that is consuming a database instance’s resources. The first question that comes to my mind is, “What is the symptom you are trying to resolve?” Are you...

Using JMX to monitor an Application Server running on Docker
This video blog explains the process of building a docker image for an application server with JMX enabled. Since we can't map multiple running containers to the same port, we pass the JMX port as an ...

Using tokens for Foglight dashboard access
Some users only require simple access to Foglight dashboards, ideally being able to skip the logon step. In Foglight Server version 5.7.5.7, the user security option of an auth token was introduced. M...