www.lepide.com HTML Site Map
Last updated: 2024, November 29 09:42:25
Total pages: 1502
www.lepide.com Homepage
1
2
/
30 pages
blog/
1 page
20-shocking-data-breach-statistics-for-2023/
1 page
20 Shocking Data Breach Statistics for 2023
what-is-intellectual-property-theft/
1 page
Intellectual Property Theft: What It Is and How to Prevent It
healthcare-data-security-best-practices/
1 page
Healthcare Data Security: Best Practices, Common Threats, and HIPAA
20-must-have-tools-for-sysadmins/
1 page
20 Must Have Tools for SysAdmins
ntfs-permissions-management-guide-and-best-practices/
1 page
NTFS Permissions Management Best Practices and Guide
what-is-kerberos-authentication-and-how-does-it-work/
1 page
What is Kerberos Authentication and How Does It Work?
top-hipaa-compliant-file-sharing-services-best-practices/
1 page
Top HIPAA Compliant File Sharing Services & Best Practices
ransomware-types-and-examples/
1 page
Common Ransomware Types and Notable Examples
account-lockout-event-id/
1 page
Account Lockout Event ID 4740 for Windows Active Directory
what-is-data-privacy/
1 page
What is Data Privacy? Important Laws and Key Challenges
common-cybersecurity-challenges-and-how-to-overcome-them/
1 page
Common Cybersecurity Challenges and How to Overcome Them
how-to-implement-zero-trust/
1 page
How To Implement Zero Trust
sharepoint-permissions-best-practices/
1 page
SharePoint Permissions Management: 10 Best Practices
common-malware-types/
1 page
12 Common Malware Types and How to Prevent Them
10-most-common-types-of-cybersecurity/
1 page
10 Most Common Types of Cybersecurity
10-cybersecurity-frameworks-you-should-know-about/
1 page
10 Cybersecurity Frameworks You Should Know About
best-practices-for-active-directory-domain-naming/
1 page
Best Practices for Active Directory Domain Naming
how-not-to-handle-a-data-breach-with-examples/
1 page
How NOT to Handle a Data Breach (With Examples)
national-cyber-security-awareness-month-2018-key-talking-points/
1 page
National Cyber Security Awareness Month 2018: Key Talking Points
can-a-private-blockchain-be-used-to-secure-sensitive-data/
1 page
Can a Private Blockchain Be Used to Secure Sensitive Data?
external-attacks-vs-insider-threats-where-should-your-security-budget-go/
1 page
External Attacks VS Insider Threats: Where Should Your Security Budget Go?
information-security-risk-management-how-to-get-it-right/
1 page
Information Security Risk Management: How to Get it Right
7-reasons-why-healthcare-is-a-prime-target-for-cyber-criminals/
1 page
7 Reasons Why Healthcare Is A Prime Target for Cyber Criminals
new-uk-government-cyber-security-standards-provide-framework-for-others-to-follow/
1 page
New UK Government Cyber Security Standards
10-tips-for-securing-windows-file-servers/
1 page
Top 10 Best Practices for Windows File Server Security
active-directory-permissions-guide-and-best-practices/
1 page
Active Directory Permissions Guide and Best Practices
how-would-your-organization-fare-if-faced-with-this-data-security-issue/
1 page
How Would Your Organization Fare if Faced with This Data Security Issue?
how-to-identify-and-prevent-a-security-misconfiguration/
1 page
How to Identify and Prevent a Security Misconfiguration
windows-event-id-4660-an-object-was-deleted/
1 page
Windows Event ID 4660 – An Object Was Deleted
what-is-a-golden-ticket-attack/
1 page
What is a Golden Ticket Attack and How to Prevent It?
how-to-prevent-data-breaches-in-the-healthcare-sector/
1 page
How to Prevent Data Breaches in the Healthcare Sector
common-poor-access-management-risks/
1 page
Common Poor Access Management Risks and How They Cause Data Breaches
how-to-securely-store-sensitive-information/
1 page
How to Securely Store Sensitive Information
when-is-a-data-breach-really-considered-a-data-breach-in-the-usa/
1 page
When is a Data Breach Really Considered a Data Breach in the USA?
powershell-variables-how-to-name-them-and-assign-values/
1 page
PowerShell Variables: How to Name them and Assign Values
what-is-identity-lifecycle-management/
1 page
What is Identity Lifecycle Management (ILM)?
what-is-a-data-classification-matrix/
1 page
What is a Data Classification Matrix?
the-problem-of-privilege-management-in-data-security/
1 page
The Problem of Privilege Management in Data Security
the-importance-of-separating-duties-and-auditing-critical-changes/
1 page
The Importance of Separating Duties and Auditing Critical Changes
18-things-it-auditors-need-to-know/
1 page
18 Things IT Auditors Need to Know
four-things-you-should-know-about-it-risk-assessments/
1 page
4 Things You Should Know About IT Risk Assessments
how-lepideauditor-helps-increase-security-in-the-education-sector/
1 page
How LepideAuditor Helps Increase Security in the Education Sector
how-just-in-time-access-supports-zero-trust/
1 page
How Just-in-Time Access Supports Zero Trust
top-8-cyber-insurance-requirements/
1 page
Top 8 Cyber Insurance Requirements and How to Achieve Them
seven-ways-to-secure-critical-data-in-the-government-sector/
1 page
7 Ways to Secure Critical Data in the Government Sector
businesses-are-failing-to-report-their-most-disruptive-data-breaches/
1 page
Businesses are Failing to Report Their Most Disruptive Data Breaches
3-things-the-deloitte-breach-can-teach-you-about-mastering-it-security/
1 page
3 Things the Deloitte Breach Can Teach You About Mastering IT Security
why-automated-response-is-critical-to-it-security/
1 page
Why Automated Response is Critical to IT Security and how Lepide helps
auditing-things-all-it-departments-need-to-know/
1 page
Things all IT departments need to know about IT auditing
the-state-of-it-auditing-today/
1 page
The state of IT auditing today
security-and-the-need-for-user-account-auditing/
1 page
Security and the need for user account auditing
can-third-party-windows-server-auditors-work-on-android-platform/
1 page
Can Third Party Windows Server Auditors Work on Android Platform?
why-you-need-centralized-event-log-management/
1 page
Why you need centralized event log management
data-loss-prevention-best-practices/
1 page
Data Loss Prevention Best Practices
common-mistakes-by-admins-in-log-analysis/
1 page
Common mistakes made by Admins during log analysis
security-flaws-in-s3-buckets-are-responsible-for-many-data-breaches/
1 page
Security Flaws in S3 Buckets are Responsible for Many Data Breaches
the-active-directory-red-forest-model/
1 page
The Active Directory Red Forest Model: Evaluating the Alternatives
ad-permissions-delegation-best-practices/
1 page
Active Directory Permissions Delegation Best Practices
top-10-audit-reports-for-it-teams/
1 page
Top 10 Audit Reports for IT Teams
to-audit-or-not-to-audit-that-is-the-question/
1 page
To audit or not to audit… that is the question
auditing-account-management-and-directory-service-access/
1 page
Auditing Account Management and Directory Service Access in Windows Server 2012
nine-ways-to-prevent-ex-employees-from-compromising-it-security/
1 page
Nine ways to Prevent Ex-employees from Compromising IT security
what-is-a-data-classification-policy/
1 page
What is a Data Classification Policy and How Does It Works?
how-will-the-new-data-protection-bill-affect-your-company/
1 page
How will the new Data Protection Bill affect your company
how-lepide-addresses-the-gartner-top-10-security-projects-for-2019/
1 page
How Lepide Addresses the Gartner Top 10 Security Projects for 2019
what-can-hospitals-do-to-protect-themselves-from-cyber-attacks/
1 page
What can Hospitals do to Protect Themselves from Cyber-Attacks?
how-will-the-new-uk-data-protection-laws-affect-your-business/
1 page
How will the new UK Data Protection Laws affect your Business?
what-is-cloud-data-protection/
1 page
What is Cloud Data Protection? Definition and Best Practices
what-is-machine-learning/
1 page
What Is Machine Learning? Types, Challenges and How It Works
what-is-cyber-threat-intelligence/
1 page
What is Cyber Threat Intelligence?
what-is-the-nis2-directive/
1 page
What is the NIS2 Directive and How to Prepare for It
database-hardening-best-practices/
1 page
Top Database Hardening Best Practices
how-to-manage-network-share-permissions/
1 page
How to Manage Network Share Permissions
the-warning-signs-of-a-data-breach-in-progress/
1 page
The Warning Signs of a Data Breach in Progress
why-privileged-accounts-are-a-gateway-to-cyber-attacks/
1 page
Why Privileged Accounts Are A Gateway to Cyber Attacks
cyber-security-vs-cyber-resilience/
1 page
Cyber-Security vs Cyber-Resilience
how-to-make-your-security-budget-go-further/
1 page
How to Make Your Security Budget Go Further: Stop Responding and Start Preventing
why-education-institutions-need-to-pay-attention-to-insider-threats/
1 page
Why Education Institutions Need to Pay Attention to Insider Threats
5-ways-not-monitoring-group-policy-changes-can-lead-to-disaster/
1 page
5 Ways not Monitoring Group Policy Changes can Lead to Disaster
smbs-and-cost-effective-data-protection/
1 page
SMBs and Cost Effective Data Protection
the-number-of-data-breaches-are-increasing-at-record-pace/
1 page
The Number of Data Breaches are Increasing at “Record Pace”, According to New Report
a-lesson-in-password-policy-and-it-security-from-peep-show/
1 page
A Lesson in Password Policy and IT Security from Peep Show
what-is-a-dns-attack/
1 page
What is a DNS Attack? Types and How to Prevent Them
todays-world-requires-shared-responsibility-for-data-security/
1 page
Today’s World Requires Shared Responsibility for Data Security
insiders-are-putting-patient-data-in-healthcare-technology-at-risk/
1 page
Insiders are Putting Patient Data in Healthcare Technology at Risk
focusing-solely-on-regulatory-compliance-could-make-your-data-less-secure/
1 page
Focusing Solely on Regulatory Compliance Could Make Your Data Less Secure
how-will-covid-19-affect-cybersecurity-spending/
1 page
How Will COVID-19 Affect Cybersecurity Spending?
15-data-security-predictions-for-2020/
1 page
15 Data Security Predictions for 2020
how-hyper-automation-will-affect-data-security/
1 page
How Hyper-Automation Will Affect Data Security
what-steps-can-uk-universities-take-to-prevent-a-data-breach/
1 page
What Steps Can UK Universities Take to Prevent a Data Breach?
8-key-data-security-trends-to-watch-out-for-in-2019/
1 page
8 Key Data Security Trends to Watch Out For in 2019
could-a-cyber-attack-be-the-cause-of-the-next-financial-crisis/
1 page
Could a Cyber-Attack Be the Cause of The Next Financial Crisis?
how-will-a-cyber-attack-impact-your-business/
1 page
How Will A Cyber-Attack Impact Your Business?
marriott-data-breach-all-you-need-to-know/
1 page
The Marriott Data Breach: All You Need to Know
6-tips-to-help-remote-workers-protect-their-data/
1 page
6 Tips to Help Remote Workers Protect Their Data
healthcare-public-administration-still-plagued-by-insider-threats/
1 page
Healthcare & Public Administration Still Plagued by Insider Threats
have-you-left-it-unlocked-with-the-keys-in/
1 page
Have You Left It Unlocked with The Keys In?
how-important-are-global-threat-intelligence-services-to-your-defense-strategy/
1 page
How Important are Global Threat Intelligence Services to your Defense Strategy
eight-technologies-financial-institutions-should-be-aware-of/
1 page
8 Technologies Financial Institutions Should Be Aware Of
the-top-five-mistakes-executives-make-following-a-data-breach/
1 page
The Top 5 Mistakes Executives Make Following a Data Breach
governments-now-using-have-i-been-pwned-to-check-data-breach-status/
1 page
Governments Now Using “Have I Been Pwned” to Check Data Breach Status
why-it-security-is-inside-out/
1 page
Why IT Security Is Inside Out
how-uk-law-firms-can-better-protect-their-critical-assets/
1 page
How UK Law Firms Can Better Protect Their Critical Assets
10-cybersecurity-trends-to-watch-out-for-in-2019/
1 page
10 Cybersecurity Trends to Watch Out For in 2019
privileged-users-growing-threat-to-your-it-security/
1 page
A Growing Threat to your IT Security: Privileged Users
how-to-use-active-directory-services-to-meet-security-and-compliance-requirements/
1 page
How to use Active Directory Services to Meet Security and Compliance Requirements
how-to-secure-your-data-when-working-with-remote-teams/
1 page
How to Secure Your Data When Working with Remote Teams
4-ways-to-measure-your-cyber-security-effectiveness/
1 page
4 Ways to Measure Your Cyber-Security Effectiveness
visibility-over-data-means-better-security-a-summary-of-infosecurity-europe-2019/
1 page
Visibility Over Data Means Better Security – A Summary of InfoSecurity Europe 2019
how-does-privilege-separation-improve-it-security/
1 page
How Does Privilege Separation Improve IT Security?
what-should-your-it-risk-assessment-focus-on/
1 page
What Should Your IT Risk Assessment Focus On?
the-5-foundations-of-data-security/
1 page
The 5 Foundations of Data Security
how-you-can-improve-data-integrity-in-3-easy-steps/
1 page
What is Data Integrity and How do Reduce Data Integrity Risk
soc-audit-checklist/
1 page
Preparing for a SOC Audit – A Checklist
the-state-of-healthcare-cyber-security-in-2018/
1 page
The State of Healthcare Cyber Security in 2018
reddit-is-sms-based-authentication-really-secure/
1 page
Reddit: Is SMS-Based Authentication Really Secure?
controlling-the-blast-radius-of-an-attack/
1 page
Controlling the Blast Radius of an Attack
are-healthcare-providers-getting-worse-at-preventing-data-breaches/
1 page
Are Healthcare Providers Getting Worse at Preventing Data Breaches?
how-much-will-a-data-breach-cost-you-and-how-can-you-reduce-it/
1 page
How Much Will a Data Breach Cost You and Can You Reduce It?
are-permissions-and-access-controls-the-answer-to-working-from-home/
1 page
Are Permissions and Access Controls the Answer to Working From Home?
how-infonomics-can-help-you-determine-your-security-budget-and-assess-your-financial-risk/
1 page
How Infonomics Can Help You Determine Your Security Budget and Assess Your Financial Risk
5-reasons-why-you-need-a-data-security-solution/
1 page
5 Reasons Why You Need a Data Security Solution
how-to-sell-cybersecurity-to-business-owners/
1 page
How to Sell Cybersecurity to Business Owners
why-transparency-and-traceability-are-important-traits-for-data-security/
1 page
Why Transparency and Traceability Are Important Traits for Data Security
the-importance-of-security-incident-reporting/
1 page
The Importance of Security Incident Reporting
why-financial-services-industry-is-seeing-an-increase-in-reported-data-breaches/
1 page
The Financial Services Industry is Seeing an Increase in Reported Data Breaches – Why?
schools-report-an-increase-in-security-incidents-since-gdpr-came-into-effect/
1 page
Schools Report an Increase in Security Incidents Since GDPR Came into Effect
a-security-strategy-for-remote-working-data-centric-audit-protection/
1 page
A Security Strategy for Remote Working: Data-Centric Audit & Protection
the-cost-of-data-breaches-in-2019/
1 page
The Cost of Data Breaches in 2019
how-to-minimize-enterprise-cyber-security-threats/
1 page
How to Minimize Enterprise Cyber-Security Threats
how-can-we-prevent-employees-violating-security-policies/
1 page
How Can We Prevent Employees Violating Security Policies?
tips-for-mitigating-data-breaches-when-using-cloud-services/
1 page
Tips for Mitigating Data Breaches When Using Cloud Services
4-security-automation-tips-for-your-business/
1 page
4 Security Automation Tips for Your Business
insider-threats-in-healthcare-280000-medicaid-patient-records-hacked/
1 page
Insider Threats in Healthcare: 280,000 Medicaid Patient Records Hacked
what-steps-can-law-firms-take-to-protect-their-confidential-data/
1 page
What Steps can Law Firms take to Protect their Confidential Data?
what-is-the-nydfs-cybersecurity-regulation-and-how-lepide-helps/
1 page
What is the NYDFS Cybersecurity Regulation and How Lepide Helps
why-cybersecurity-security-isnt-just-an-it-problem/
1 page
Why Cybersecurity Security Isn’t Just an IT Problem
the-state-of-education-cyber-security-in-2018/
1 page
The State of Education Cyber-Security in 2018
the-state-of-finance-cybersecurity-in-2018/
1 page
The State of Finance Cybersecurity In 2018
maintaining-data-security-when-employees-are-fired-or-furloughed/
1 page
Maintaining Data Security When Employees Are Fired or Furloughed
most-healthcare-organizations-cant-recover-from-data-breaches/
1 page
Most Healthcare Organizations Can’t Recover from Data Breaches
ten-predictions-for-it-security-in-2018/
1 page
10 Predictions for IT Security in 2018
how-can-financial-institutions-prevent-and-recover-from-a-data-breach/
1 page
How can Financial Institutions Prevent and Recover from a Data Breach
how-can-educational-institutions-respond-to-the-growing-threat-of-a-cyber-attack/
1 page
How can Educational Institutions Respond to the Growing Threat of a Cyber-Attack?
the-10-biggest-data-security-problems-in-the-healthcare-industry/
1 page
The 10 Biggest Data Security Problems in the Healthcare Industry
a-closer-look-at-insider-threats-in-the-financial-sector/
1 page
A Closer Look at Insider Threats in the Financial Sector
why-arent-consumers-angrier-about-data-breaches/
1 page
Why Aren’t Consumers Angrier About Data Breaches?
it-security-trends-of-2018/
1 page
IT Security Trends Of 2018
using-deception-to-fight-cyber-crime/
1 page
Using Deception to Fight Cyber-Crime
does-the-uk-have-issues-employing-and-training-cybersecurity-professionals/
1 page
Does the UK Have Issues Employing and Training Cybersecurity Professionals?
lepide-data-security-platform-varonis-alternative/
1 page
Varonis Alternative: Lepide Data Security Platform
is-microsoft-office-365-hipaa-compliant/
1 page
Is Microsoft Office 365 HIPAA Compliant?
gdpr-compliance-best-practices/
1 page
8 Best Practices to Stay Compliant with GDPR
ransomware-prevention-best-practices/
1 page
10 Best Practices to Prevent Ransomware Attacks
13-cjis-compliance-requirements/
1 page
13 CJIS Compliance Requirements (Criminal Justice Information Services)
how-to/
118 pages
How-to Guides | A Knowledgebase to Help IT Professionals
How to Find who Added a User to the Domain Admins Group
How to View Active Directory Audit Logs
How to Audit Account Logon Events in Active Directory
Find Source of Failed Logon Attempts in Active Directory
How to List All Computers in an OU using PowerShell
Troubleshoot AD Domain Controller could not be Contacted
PowerShell to Find a File and Check If File Exists
How to View or Check Netapp Logs
How to Check Who Last Modified a File in Windows?
How to Find Empty Folders using PowerShell
How To Create an Event Log Clear Report
How to Find Out Who Changed the File and Folder Permissions
How to Disable Control Panel using Group Policy
How to Use Group Policy to Map Network Drives on Windows
How to Change/Edit Group Policy Settings?
How to Audit Group Policy Changes Using Event Logs
How to Track Who Deleted a GPO in Active Directory
PowerShell to Backup and Restore Group Policy Objects
How to Check Who Deleted a File on SharePoint
How to Check SharePoint Permissions for a User and Group
How to Audit SharePoint Permissions Changes
How to Audit SharePoint Changes by viewing Audit Logs
How To Check SharePoint Site Usage
How to Compare Permissions in Exchange Server
How to Track Who Accessed Mailboxes in Exchange Server 2016
How to Monitor the Health of Exchange Server
How to Track Permission Changes on Exchange Server Mailboxes
How to Track Exchange Server Shared Mailboxes Access using EAC
How To Check if MFA is Enabled in Microsoft 365
List Shared Mailboxes Members & Permissions with PowerShell
What is Error Code: 53003 and How to Fix it?
How to Get an External Sharing Report in SharePoint Online
How to Set up Alerts in SharePoint Online
How to Set Up Alerts in Exchange Online
Guide to Use Get-ADComputer Cmdlet in PowerShell
How to Automate PowerShell Scripts with Task Scheduler
Find Weak Passwords in Active Directory with PowerShell
PowerShell Get-Mguser to Get & Export Azure AD Users to CSV
How to Check and Export Folder Permissions with PowerShell
How to Get AD User Group Membership using PowerShell
How to View SQL Server Database File Locations
How to List User Roles in SQL Server
How to Enable SQL Server Auditing and View Audit Logs
Check User Login History in Windows Active Directory
Find Account Lockout Source and Cause in Active Directory
How to Find Active Directory User’s Last Logon Date & Time
How to Audit Permissions Changes in Active Directory
How to Check the Health of Active Directory
How to Audit File Access Events on Windows File Server
Assign Permissions to Files & Folders using Group Policy
How to Get an NTFS Permissions Report using PowerShell
How to Audit Permission Changes on File Servers
How to Audit File and Folder Deletion on Windows File Server
How to Audit Active Directory Changes using Event Logs
Track File and Folder Changes/Modifications on Windows Server
Restore Deleted Active Directory Objects using Recycle Bin
How to View SharePoint Online Audit Logs
Get SharePoint Online Permissions Report using PowerShell
Find Sensitive Data in SharePoint Online and MS Teams
How to Track Changes Made by Exchange Administrators
How to Enable Mailbox Auditing in Office 365 (Exchange Online)
How to Detect Mailbox Permission Changes in Exchange Online
Check Login Activity/History in Microsoft Office 365
How to Track Logons Outside of Trusted Locations in Azure AD
How to Get an Exchange Online Mailbox Permissions Report
How to Track Deleted Users in Azure Active Directory
How to Audit Sharing Settings Changes in SharePoint Online
Export Active Directory Users to CSV using PowerShell
Get-ADUser PowerShell to List All Active Directory Users
PowerShell Get-ADGroupMember: List Active Directory Group Members
How to Find Bad Password Attempts in Active Directory
Check Password Change History in Windows Active Directory
Get List of Users with Password Never Expires using PowerShell
How to Delegate Rights to Unlock Accounts in Active Directory
How to Fix Broken Registry Items in Windows
How to Add a Domain Controller in Active Directory
How to Check Active Directory Replication
Active Directory Users & Computers (ADUC) Installation Guide
Check AD User Last Password Change Date with PowerShell
How to Compare Permissions in File Server
PowerShell to Find Files by Owners on Windows File Server
Monitoring File and Folder Activities on Windows File Server
How to Check Who Disabled a User Account in Active Directory
How to Get an Active Directory User Permissions Report
Audit Permission Changes in OneDrive for Business Objects
How to Track Who Created a User Account in Active Directory
How to Track Who Enabled a User in Active Directory
How to Audit User Account Changes in Active Directory
How to Compare Permissions in Active Directory
PowerShell Get-ADGroup to List Active Directory Groups
How to Get Disabled Active Directory Users with PowerShell
PowerShell to Create New Users in Active Directory
How to Track Shared Mailbox Access in Office 365 with PowerShell
Manage Active Directory Organizations Units with PowerShell
Find and Classify Sensitive Data Files with FSRM on Windows File Server
Track Privilege Escalation in MS Teams and SharePoint Online
How to Find Who Deleted a User Account in Active Directory
How to Configure Alerts for Active Directory in Event Viewer
Check Who accessed a Shared Folder and Made File Changes
How to Track Active Directory User Logon/Logoff Time
Enable Active Directory Auditing – A Step-by-Step Guide
How to Track Data Access in MS Teams and SharePoint Online
How to Unlock, Enable, and Disable AD Accounts with PowerShell
PowerShell Get-LocalUser to List All Local Users on Windows
How to Check Files and Folders Permissions in Windows
How to Monitor User Activity in Windows Computers
Identify Suspicious Insider Activity using Active Directory
Enable Active Directory Password Expiration Notification
How to Get a List of Active Directory User Accounts Created in Last 24 hours
How to Audit Active Directory Group Membership Changes
How to Find Inactive User Accounts in Active Directory
How to Track Privileged Users’ Activities in Active Directory
How to Audit Organizational Units (OUs) Changes in Active Directory
How to Add and Remove AD Groups and Objects with PowerShell
How to Find Out When an Object was Created in Active Directory
What is Active Directory Recycle Bin and How to Enable It?
How To Enable File and Folder Auditing on Windows Server
cyber-learning/
2 pages
Cyber Learning With Lepide
xmlrpc.php?rsd
what-is-an-insider-threat/
1 page
What is an Insider Threat? Types, Common Indicators and Examples
what-is-ransomware-and-how-to-defend-against-it/
1 page
What is Ransomware and How to Defend Against It
what-is-customer-identity-and-access-management/
1 page
What is Customer Identity and Access Management (CIAM)?
what-is-database-activity-monitoring-dam/
1 page
What is Database Activity Monitoring (DAM)?
what-is-credential-harvesting/
1 page
What Is Credential Harvesting?
data-classification-software-and-tools/
1 page
Data Classification Software and Tools: Advantages & Best Practices
what-is-a-dcsync-attack/
1 page
DCSync Attack and How to Protect Active Directory Against It
what-is-dcshadow-attack/
1 page
What is DCShadow Attack and How to Protect Against It?
what-is-vendor-privileged-access-management/
1 page
What is Vendor Privileged Access Management (VPAM)?
pam-vs-pim/
1 page
PAM vs PIM: Privileged Identity Management Explained
what-is-user-activity-monitoring-uam/
1 page
What is User Activity Monitoring? Benefits & Best Practices
what-is-secrets-management/
1 page
What is Secrets Management? Challenges and Best Practices
what-is-privileged-access-management-as-a-service-pamaas/
1 page
What is Privileged Access Management as a Service (PAMaaS)?
endpoint-privilege-management/
1 page
What is Endpoint Privilege Management (EPM)?
what-is-the-nist-cybersecurity-framework/
1 page
What is NIST CSF and 5 Core Elements Cybersecurity Framework
what-is-saml/
1 page
What is SAML and How SAML Authentication Works
what-is-user-and-entity-behavior-analytics-ueba/
1 page
What is User and Entity Behavior Analytics (UEBA)?
what-is-data-loss-prevention-dlp/
1 page
What Is Data Loss Prevention? DLP Types and How It Works
what-is-personally-identifiable-information-pii/
1 page
What Is Personally Identifiable Information (PII)? A Complete Guide
what-is-the-cyber-kill-chain/
1 page
What is the Cyber Kill Chain? Phases and Its Role in Cybersecurity
what-is-a-brute-force-attack/
1 page
What is a Brute Force Attack? Types and How to Defend Against Them
what-is-a-proxy-server/
1 page
What is a Proxy Server? Definition, Type and How It Works
what-is-pgp-encryption/
1 page
What is PGP Encryption? How It Works and Common Uses
what-is-an-smb-port/
1 page
What is an SMB Port? Ports 445 and 139 Guide
red-team-vs-blue-team-the-key-difference/
1 page
Red Team vs Blue Team: The Key Difference
what-is-zero-trust-security/
1 page
What is Zero Trust Security? Core Principles & How It Works
what-is-the-mitre-attack-framework/
1 page
What is the MITRE ATT&CK Framework?
what-is-a-computer-worm/
1 page
What is a Computer Worm and How Does It Work?
what-is-a-log-file/
1 page
What is a Log File? Importance and Log File Types
what-is-azure-kubernetes-service-aks/
1 page
What Is Azure Kubernetes Service (AKS)?
what-is-crud/
1 page
What is CRUD? Create, Read, Update, and Delete
what-is-a-keylogger/
1 page
What is a Keylogger? How to Protect Against It?
what-is-logging-as-a-service-laas/
1 page
What is Logging as a Service (LaaS)?
what-is-mdr-managed-detection-and-response/
1 page
What is MDR (Managed Detection and Response)?
what-is-spear-phishing/
1 page
What is Spear Phishing and How It Works?
what-is-a-trojan-horse/
1 page
What is a Trojan Horse? How Can You Detect and Prevent It?
what-is-a-zero-day-attack/
1 page
What is a Zero-Day Attack and How to Prevent It?
category/
cybersecurity/
1 page
Cybersecurity Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
general/
1 page
General Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
malware/
1 page
Malware Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
log-management/
1 page
Log Management Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
api/
1 page
API Archives - Cyber Learning With Lepide - Cyber Learning With Lepide
freeware/
10 pages
Lepide Freeware | Monitoring and Reporting Tools
Free Change Monitoring & Reporting Solution for Critical IT Systems
Account Lockout Tool for Active Directory - Lepide Freeware
Open Shares & Stale Data Report | Lepide Freeware
Active Directory User Account Status | Lepide Freeware
Track Privileged Active Directory Users | Lepide Freeware
Event Log Manager Freeware for Streamline Log Monitoring
Free Active Directory Tool for Monitoring & Reporting AD Changes – Lepide
Free Group Policy Tool for Monitoring & Reporting GPO Changes - Lepide
Free Exchange Server Change Monitoring & Reporting Tool – Lepide
guide/
7 pages
lepide-customer-support-reference-guide.pdf
lepide-dsp-virtual-appliance-deployment-guide.pdf
user-password-expiration-reminder.pdf
how-to-use-lepide-to-report-on-external-data-sharing-in-microsoft-365.pdf
ladss-generate-P12-key.pdf
password-synchronization-configuration-for-Office-365.pdf
how-to-search-for-users-and-report-on-disabled-users-in-ladss.pdf
roi-calculator/
1 page
ROI Calculator - Lepide Data Security Platform
configurationguide/
47 pages
data-breach-alignment-guide.pdf
data-access-governance-alignment-guide.pdf
insider-threats-alignment-guide.pdf
compliance-alignment-guide.pdf
license-activation-process-guide.pdf
lepide-dsp-solution-upgrade.pdf
lepide-dsp-advanced-configuration.pdf
current-permission-report-configuration-guide.pdf
lepide-dsp-app-configuration-guide.pdf
connect-for-spirion.pdf
configuring-lepide-using-polp.pdf
lepide-iq-user-guide.pdf
schedule-daily-summary-reports.pdf
data-retention.pdf
eDiscovery-user-guide.pdf
using-lepide-reports.pdf
how-to-configure-a-real-time-alert.pdf
data-discovery-and-classification.pdf
configuration-guide-siem-integration.pdf
configuration-guide-session-recording.pdf
lepide-dsp-enable-auditing-manually.pdf
lepide-dsp-enable-logon-logoff-monitoring.pdf
web-console-user-guide.pdf
data-loss-prevention-alignment-guide.pdf
digital-transformation-alignment-guide.pdf
privileged-access-management-alignment-guide.pdf
data-protection-alignment-guide.pdf
threat-detection-and-response-alignment-guide.pdf
enable-lepide-for-remote-workers.pdf
enable-lepide-for-ransomware.pdf
stale-data-reporting.pdf
identify-users-with-excessive-privileges.pdf
configure-a-threat-detection-workflow.pdf
monitor-non-owner-mailbox-access.pdf
how-to-identify-open-shares.pdf
perform-an-investigation-on-a-privileged-user.pdf
report-on-security-setting-changes-in-group-policy.pdf
how-to-use-lepide-with-your-siem-solution.pdf
report-on-activity-outside-of-business-hours.pdf
detect-when-an-email-with-sensitive-data-has-been-sent.pdf
report-on-permission-changes-to-sensitive-data-on-sharepoint-online.pdf
ueba-configuration-guide.pdf
configuration-guide-for-web-console.pdf
lepide-dsp-configure-mailbox-auditing.pdf
create-certificate-for-tenant.pdf
sql-server-configuration-guide.pdf
polp-configuration-guide.pdf
active-directory-self-service/
10 pages
Active Directory Self Service Password Reset and Account Unlock for Users
how-to-deploy-gina.pdf
Release History of Lepide Active Directory Self Service
FAQs about Lepide Active Directory Self Service
Request a Quote for Lepide Active Directory Self Service
Request a Demo for Lepide Active Directory Self Service
Download Free Trial of Active Directory Self Service Software
Self-Service Password Reset & Self Account Unlock Tool for Active Directory
Configure Multifactor Policy to Self Password Reset, Account Unlock & Self Information Update
Reports on AD Self Password Reset, Account Unlocks, Changed & Expired Passwords
industry/
6 pages
Lepide in the Finance Industry
Ensure the Security of Educational Data with Lepide
Lepide in the Healthcare Industry
Lepide for Public Sector Organizations
Ensure Data Security in Technology Sector with Lepide
Get Full Visibility and Control on Critical Changes in Your Industry
event-log-manager/
11 pages
Manage Windows Event Logs with Lepide Event Log Manager
Release History of Lepide Event Log Manager
Request a Quote for Lepide Event Log Manager
Schedule Demo of Lepide Event Log Manager
Download Enterprise version of Lepide Event Log Manager Tool
Archive and Consolidate Windows & W3C Event Logs to Central Repository
Event Logs Monitoring and Alert Generation for Critical Events
Windows & W3C Event Log Browsing For Network Wide Computers
Comprehensive Event Log Reporting and Compliance Status Reports
View Screenshots of Lepide Event Log Manager Software
Download Freeware Version of Lepide Event Log Manager Tool
installationguide/
10 pages
lepide-dsp-installation-and-prerequisites-guide.pdf
installation-uninstallation-ldsp.pdf
file-server-quick-start-guide.pdf
file-server-advanced-configuration-guide.pdf
netapp-auditing-quick-start-guide.pdf
sharepoint-server-quick-start-guide.pdf
universal-auditing-configuration-guide.pdf
ladss-installation-configuration-guide.pdf
lelm-installation-guide.pdf
quick-start-guide-amazon-s3.pdf
casestudy/
11 pages
united-dairy-farmers.pdf
spart5.pdf
Napier.pdf
cecabank.pdf
first-state-bank.pdf
venbrook-llc.pdf
city-of-danville.pdf
wchn.pdf
cofm.pdf
first-legal.pdf
hoge-fenton.pdf
by-usecase/
8 pages
ransomware.pdf
active-directory-security.pdf
microsoft-365-security.pdf
data-breaches.pdf
data-loss-prevention.pdf
data-access-governance.pdf
insider-threats.pdf
compliance.pdf
real-world-examples/
3 pages
marriott-international-data-breach.pdf
tesla-insider-threat.pdf
colonial-pipeline-attack.pdf
quick-start-guide/
5 pages
active-directory.pdf
active-directory-cleaner.pdf
quick-start-guide-emc-isilon.pdf
microsoft-365.pdf
quick-start-guide-nasuni.pdf
datasheet/
43 pages
lepide-data-security-platform.pdf
lepide-trust.pdf
lepide-detect.pdf
lepide-protect.pdf
lepide-identify.pdf
iso-27001.pdf
glba.pdf
gdpr.pdf
hipaa.pdf
pci-dss.pdf
fisma.pdf
nydfs.pdf
nist-800-171.pdf
nist-csf.pdf
cjis.pdf
cmmc.pdf
sox.pdf
ccpa.pdf
active-directory.pdf
group-policy.pdf
exchange-server.pdf
windows-file-server.pdf
netapp-filer.pdf
sql-server.pdf
sharepoint.pdf
office-365.pdf
exchange-online.pdf
sharepoint-online.pdf
azure-ad.pdf
ms-teams.pdf
onedrive-for-business.pdf
amazon-s3.pdf
gsuite.pdf
dropbox.pdf
nasuni.pdf
datasheet-lepide-ad-self-service.pdf
datasheet-lepideadcleaner.pdf
LELM-datasheet.pdf
Datasheet-LepideServerHealthCheck.pdf
datasheet-lepide-ad-gpo-restore.pdf
threat-detection-and-response.pdf
data-access-governance.pdf
data-classification.pdf
infographics/
12 pages
Infographics about IT Audit, Compliance and Security from Lepide
How Can Lepide Help Your Organization Detect Insider Threats and Prevent Data Breaches
2018 Q2 Healthcare Data Breaches
Infographic - What can you do if are the victim of a Ransomware attack
Infographic - Is Your Business Prepared for the Forthcoming GDPR
Infographic - Reacting to Ransomware Attacks Like ‘Petya’
Three Reasons - Why Change Control Is Important for Organizations – Infographic
What you need to know to secure your Active Directory environment
How to delegate privileges to users whilst maintaining the security of Active Directory
How to avoid privilege abuse in Active Directory to ensure security
8 critical flaws in auditing your IT Infrastructure natively
Infographic - List of Most Powerful Audit Reports in Lepide Data Security Platform
whatsnew/
1 page
whatsnew-auditorsuite16.4.pdf
1
2