IT Pros
Articles
Explore by topic:
Exchange Journaling and Diagnostics: How to
Journaling and Diagnostics Logging are services to monitor and audit activity on Microsoft Exchange servers. They provide basic auditing functionality for email activity (e.g. who sent which message to whom)...
5 Things You Should Know About Big Data
Big data is a very hot topic, and with the Splunk IPO last week seeing a 1999-style spike, the bandwagon is overflowing. Weâre poised to see many businesses pivoting into...
What is OAuth? Definition and How it Works
We’ve talked about giving away your passwords and how you should never do it. When a website wants to use the services of anotherâsuch as Bitly posting to your Twitter...
Giving Away Your Passwords
You might have seen the headlines from the past couple of weeks detailing how some employers were demanding employees hand over their Facebook passwords or else. Privacy violation? Just a...
File system audit data taking up too much space? Read onâŠ
I had the privilege of speaking about eliminating data security threats at Data Connectors in Houston a couple weeks ago, and I was asked by several people about how much...
Why Do SharePoint Permissions Cause So Much Trouble?
SharePoint permissions can be the stuff of nightmares. Â At Varonis, we get a chance to meet with a lot of SharePoint administrators and itâs rare that theyâre not exhausted trying...
Open Shares
In my post last week, Share Permissions, I promised Iâd write a follow up post on âopen shares.â Open shares, in a nutshell, are folders that are accessible to all...
Share Permissions
In one of our recent posts, What About Individual Users on ACLâs? I mentioned that some organizations have opted for using Windows share permissions instead of NTFS permissions for file...
What About Individual Users on ACL’s?
One question I received in response to our recent post about aligning windows security groups and automating entitlement reviews was, âIf youâre using single-purpose security groups and managing them automatically...