Highlights from The Future of Leadership Luncheon

By |April 21st, 2016|

This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working […]

Do these three things today to secure your company data

By |April 13th, 2016|

We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important […]

Monitoring Windows/AD Authentications and Logon Activity

By |January 14th, 2016|

Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which […]

Inactive Active Directory User Accounts

By |January 14th, 2016|

Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network.  Most […]

Auditing and Monitoring Active Directory Group Policies

By |January 14th, 2016|

Group Policy is a core component of Active Directory (AD) used to centrally manage an organizations’ security, application, and user settings. Group Policy settings are divided into user and computer sections, and a policy can […]

Assess and Monitor File/Folder Security Permissions

By |January 14th, 2016|

Access to files and folders is controlled by permissions or Discretionary Access Control Lists (DACLs) assigned to folders and files. In an Active Directory (AD) environment, user access to file and folder resources is governed […]

Detecting High Volume Copy Operations on Windows File Systems with LT Auditor+ 2013

By |January 14th, 2016|

Why Audit High-Volume Copy Operations?
One of the most common methods to extract or steal information is to copy large volumes of critical information from file shares to either flash drives or other USB devices that […]

Activity Director User Account Lockout Activity

By |January 14th, 2016|

User account lockouts in Active Directory occur for a variety of reasons, and often the challenge is to determine the Windows node and user causing the lockout so as to resolve the issue. Account lockouts […]

Track and Audit Active Directory Access Control Permissions

By |January 14th, 2016|

Access control is used to govern user access to shared resources for security purposes. Active Directory access control is administered at the object level by setting different levels of access, or permissions, to objects. Some […]

Track and Audit Active Directory Group Membership

By |January 14th, 2016|

Active Directory (AD) has two types of groups called Security and Distribution. Distribution groups are used for distribution lists in Exchange and cannot be assigned permissions or rights. Security groups are used for assigning permissions […]