Understanding User Threat Detection With Wine
Step 1: Implement user threat detection. Step 2: Have a glass of wine. In my previous blog posts, I talked about pattern-based vs. rules-based user behavior analytics (UEBA), modeling user activity to...
Step 1: Implement user threat detection. Step 2: Have a glass of wine. In my previous blog posts, I talked about pattern-based vs. rules-based user behavior analytics (UEBA), modeling user activity to...
In my previous blog post, I talked about user behaviors that you want to model in order to capture a wide array of anomalies as well as how to use them to detect patterns of suspicious user activity. ...
In my previous blog post, I talked about different approaches you can take to identify insider threats in your Windows environment with user behavior analytics — a rule-based vs. pattern-based approac...
The humorist Sam Levenson once said, “You must learn from the mistakes of others. You can't possibly live long enough to make them all yourself.” While that’s good advice for most situations, when it ...
Do you have an Office 365 migration in your future? Whether it’s being driven by M&A activity or simply your organization’s broader cloud commitment, you might be a little stressed about it, since yo...
Being an IT administrator can be an enjoyable, rewarding job. So is parenting, for that matter. But being an IT administrator can also be incredibly stressful with frequent hair-pulling moments. Again...
They say that what happens in Vegas, stays in Vegas — but that won’t be the case at Microsoft Inspire! The annual partner event of the year is coming to Las Vegas July 15–19, and we’d love to not only...
Six Quest Microsoft Platform Management solutions just won honors in the 2018 Annual American Business Awards! One of the seven Stevie Awards competitions, the American Business Awards are the nation’...
I’m excited to announce that Quest Software has been named the top winner in the 2018 People's Choice Stevie Awards for Favorite New Products! This category is a feature of The American Business Award...
Do you remember when Microsoft introduced the Active Directory Recycle Bin, way back in Windows Server 2008 R2? It was a huge advance, eliminating the need to perform an authoritative restore to recov...
Hello everyone, InTrust can collect event log information from many different sources (you can reed more in the datasheet), but what is mostly unknown is that it can collect information from custom lo...
My three earlier posts in this series paint a pretty bleak picture of the healthcare industry: Despite the wide variety of compliance regulations on the books around the world, healthcare organizatio...