In my previous post, I touched on how you can identify users in AD with elevated rights. Now we need to determine if they're really necessary.
Step 2: Identifying what rights are needed for the job.
I can't begin to tell you how many companies that…
In my previous post, I touched on how you can identify users in AD with elevated rights. Now we need to determine if they're really necessary.
Step 2: Identifying what rights are needed for the job.
I can't begin to tell you how many companies that…
Co-Authored by Matt Nelson

Image Credit: Trev Grant | CC 2.0
YES! It’s October, and while most of you are using your in-laws’ wardrobe to decorate the front yard for Halloween and scare off (youth) intruders, we thought we’d let you know it is also National…
This monthly publication will provide new and updated information regarding the products that we offer and organized in the following categories: product notifications, new knowledgebase articles, product life cycle, services, training, trending videos…
The Application User Interface is simply Role Based Access control to the Function and Features of the Change Auditor when using client, it restricts access to the client interface based on permission, it is also known as User Interface Authorization.
…Dollar Shave Club’s founder Michael Dubin said something like that in his first viral video about his company, and it completely changed the razor market. For a few bucks a month, his company would ship razors and blades directly to your home once a…
To understand why Change Auditor for Exchange requires the Exchange Scripting Agent, it is important to understand the function of the Exchange Scripting Agent.
The Scripting Agent is called (if enabled) when a cmdlet runs on an Exchange server. This…

Change Auditor now supports Client Certificate Authentication. This is a welcome feature for administrator who prefer a more secure method of Authenticating users connecting with the web client. Introducing Client Certificate Authentication in the client…