• Products
    • View all products
    • Free trials
    • Buy online
  • Solutions
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Services
    • Consulting Services
      • Overview
      • Microsoft Platform Services
      • Data Protection Services
      • Unified Endpoint Management
      • Performance Monitoring Services
      • Database Management Services
    • Educational Services
    • Support Services
  • Support
    • Support Home
    • By Product
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Consulting Services
      • Microsoft Platform Management
      • Data Protection
      • Unified Endpoint Management
      • Performance Monitoring
      • Database Management
    • Technical Documentation
    • Educational Services
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Technology Partners
    • Partner Community
    • Deal Alert
  • Blogs
    • IT Industry Insights
    • Quest Solution Blogs
      • Data Protection
      • Database Management
      • ITNinja
      • Microsoft Platform Management
      • Performance Monitoring
      • Toad World Blog
      • Unified Endpoint Management
  • Forums
  • 製品情報
    • すべての製品情報%E3%82%92見る
    • Change Auditor
    • Foglight
    • KACE
    • Metalogix
    • Migration Manager
    • Migrator for Notes to SharePoint
    • NetVault Backup
    • On Demand Migration for Email
    • QoreStor
    • Rapid Recovery
    • Recovery Manager
    • SharePlex
    • Spotlight
    • Toad
  • ソリューション
    • すべてのプラットフォームを見る
    • クラウド管理
    • GDPRコンプライアンス
    • データ保護
      • 概要
      • クラウド管理
      • ディザスタリカバリ
      • バックアップとリカバリ
      • Office 365 データ保護
      • 仮想化管理
      • 重複除外と複製
    • データベース管理
      • 概要
      • DevOps
      • データの準備と分析
      • データベースのクラウド移行
      • データベースパフォーマンス監視
      • データベース管理
      • データベース複製ソフトウェアツール
    • 統合エンドポイント管理
      • 概要
      • エンドポイントコンプライアンス
      • エンドポイントセキュリティ
      • エンドポイントの可視化
    • Microsoftプラットフォーム管理
      • 概要
      • ハイブリッドActive Directoryのセキュリティとガバナンス
      • Microsoftプラットフォームの移行計画と統合
      • セキュリティとコンプライアンス
      • 情報アーカイブおよびストレージ管理ソリューション
      • Windowsのバックアップとリカバリ
      • Microsoft Serverのパフォーマンスと可用性
      • レポート作成機能
      • グループポリシーと権限
    • パフォーマンス監視
  • サービス
    • コンサルティングサービス
      • 概要
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • トレーニングと認定資格
    • サポートサービス
  • サポート
    • サポートホーム
    • 製品で検索
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • お問い合わせ
      • すべて
      • カスタマサービス
      • ライセンス アシスタンス
      • 更新のアシス%E3%82%BFンス
      • 技術サポート
    • コミュ%E3%83%8Bティフォーラム
    • ソフトウェアのダウン%E3%83%ADード
    • ナ%E3%83%AC%E3%83%83ジ%E3%83%99ース
    • マイアカウント
      • マイ プロダクト
      • Myサービスリクエスト
      • マイ ライセンス
      • マイ グループ
      • マイ プ%E3%83%ADフ%E3%82%A1イル
    • ポリ%E3%82%B7ーおよび手順
    • コンサル%E3%83%86ィングサー%E3%83%93ス
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • リリースノートおよびガイド
    • 教育サービス
    • ビデオチュートリアル
  • トライアル
  • パートナー
    • 概要
    • Partner Circleへのログイン
    • パートナーになる
    • Find a Partner
    • パートナーコミュニティ
    • Deal Alert
  • コミュニティ
Quest Community
Quest Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • Data Protection
  • Database Management
  • Microsoft Platform Management
  • Performance Monitoring
  • Unified Endpoint Management
  • Quest
  • More
  • Cancel
  • New
  • All tags
  • Security
  • Active Directory
  • Active Directory security
  • AD security
  • auditing
  • Change Auditor
  • Cloud
  • Compliance
  • cybersecurity
  • Data Protection
  • Endpoint Management
  • endpoint systems management
  • events
  • insider threat
  • InTrust
  • KACE
  • log management
  • microsoft
  • Microsoft Platform Management
  • Modernization
  • Office 365
  • Ransomware
  • Thought Leadership
  • Troubleshoot
  • Unified Endpoint Management
  • Windows
  • Security of PST files

    The Cybersecurity Risks of PST Files

    Mike Weaver
    Mike Weaver

    Office 365 migrations can open the door to unforeseen cybersecurity risks. One aspect that is often overlooked is the security risks when PST files are left behind in a migration project. In this article, we'll dive into what the risks are and the importance…

    • over 3 years ago
    • Blogs
    • Microsoft Platform Management
  • What is Active Directory? Part 3: Active Directory Security and Compliance

    What is Active Directory? Part 3: Active Directory Security and Compliance

    Jennifer LuPiba
    Jennifer LuPiba

    In my first post in this series, I explained what Active Directory is and what it’s used for. In the next post, we explored Active Directory management. Now let’s dig into Active Directory security and compliance. What do you need to do to…

    • over 6 years ago
    • Blogs
    • Microsoft Platform Management
  • SQL Server security best practices

    13 SQL Server Security Best Practices

    Rajendra Gupta
    Rajendra Gupta

    Data is a critical asset of every organization, and poorly-secured databases are too often to blame for security breaches. This article details SQL server security best practices, as well as essential security considerations for protecting your databases…

    • over 4 years ago
    • Blogs
    • Database Management
  • 10 Microsoft Service Account Best Practices

    10 Microsoft Service Account Best Practices

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    Microsoft service accounts are a critical part of any Windows ecosystem because they are used to run essential services and applications, from web servers to mail transport agents to databases. But all too often, they are not used and managed properly…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • Has the HAFNIUM Attack Made On-Premises Exchange Too Risky to Maintain?

    Has the HAFNIUM Attack Made On-Premises Exchange Too Risky to Maintain?

    Richard Dean
    Richard Dean

    “Microsoft continues to see multiple actors taking advantage of unpatched systems to attack organizations with an on-premises Exchange Server.” March 8th, 2021. Microsoft Threat Intelligence Center (MSTIC).

    By now you’ve all heard the …

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • How Hackers Exploit Group Policy Objects (GPOs) to Attack Your Active Directory

    How Hackers Exploit Group Policy Objects (GPOs) to Attack Your Active Directory

    Matthew Vinton
    Matthew Vinton

    Psst! Want to know a great way to spread ransomware across a corporate network? Compromise the organization’s Group Policy.

    Want to know a great way to cripple an organization’s defenses against data theft? Compromise Group Policy.

    In fact…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • How to Assess Your Office 365 Security Risk

    How to Assess Your Office 365 Security Risk

    vladcatrinescu
    vladcatrinescu

    Security has become a top concern for organizations around the world. And as content continues to move into the cloud, organizations are doubling down on how they can ensure the safety of their sensitive and personal information.

    Why? If we look at the…

    • over 6 years ago
    • Blogs
    • Microsoft Platform Management
  • A 4-Step Plan for Effective Group Policy Management — and Stronger IT Security

    A 4-Step Plan for Effective Group Policy Management — and Stronger IT Security

    Jennifer LuPiba
    Jennifer LuPiba

    Just how critical is Group Policy?

    Well, what might happen if your lockout policy got changed and hackers were allowed unlimited attempts to guess a user’s password? What if the predefined bookmarks on all your users’ machines were redirected to malicious…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • What is Group Policy and How Do GPOs Work?

    What is Group Policy and How Do GPOs Work?

    Matthew Vinton
    Matthew Vinton

    Group Policy is a critical element of any Microsoft Active Directory (AD) environment. But exactly what is it and how does it work? How can attackers compromise it, and how can you defend yourself? Here are all the essential things you need to know.

    …
    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • What is KRBTGT and Why Should You Change the Password?

    What is KRBTGT and Why Should You Change the Password?

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    KRBTGT is an account used for Microsoft’s implementation of Kerberos, the default Microsoft Windows authentication protocol. Understanding the ins and outs of KRBTGT accounts can mean the difference between having a secure, compliant network and opening…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • Microsoft Teams Security: A Primer on How to Secure Microsoft Teams

    Microsoft Teams Security: A Primer on How to Secure Microsoft Teams

    Curtis Johnstone
    Curtis Johnstone

    Microsoft Teams security is a hot topic. Four reasons are making this a top priority:

    1. Teams is a gateway into your business. As a service, Teams is tightly integrated with Microsoft 365 and leverages critical applications such as SharePoint Online, Exchange…
    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • 2021 Prediction #6: Short-Term Employees Will Increase the Risk to IP

    2021 Prediction #6: Short-Term Employees Will Increase the Risk to IP

    Jennifer LuPiba
    Jennifer LuPiba

    A few posts back, I revealed my eight predictions for 2021. Since then, I’ve dived into the details of the first five:

    1. Ransomware victims will face penalties.
    2. Your digital reputation will come under attack.
    3. Zerologon will continue to cause pain…
    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • 2021 Prediction #4: People Will Remember the Hard Way They Have Group Policy

    2021 Prediction #4: People Will Remember the Hard Way They Have Group Policy

    Jennifer LuPiba
    Jennifer LuPiba

    Let’s continue stepping through my eight predictions for 2021!  So far, we’ve covered why ransomware victims will face penalties, how your digital reputation will come under attack and why Zerologon will continue to cause pain for IT pros. 

    …
    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • 2021 Prediction #3: Zerologon Will Continue to Haunt Us Into 2021

    2021 Prediction #3: Zerologon Will Continue to Haunt Us Into 2021

    Jennifer LuPiba
    Jennifer LuPiba

    Let’s continue stepping through my eight predictions for 2021!  So far, we’ve been talking mainly about attacks like ransomware and digital reputation attacks. Today, we’re going to switch it up by discussing not an attack to defend against…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • 2021 Prediction #2: Expect Dynamic Denial of Reputation Attacks

    2021 Prediction #2: Expect Dynamic Denial of Reputation Attacks

    Jennifer LuPiba
    Jennifer LuPiba

    Welcome back to my in-depth discussions of my eight predictions for 2021! I hope you found the dive into my first prediction on ransomware helpful. Today, we’re going to tackle prediction #2: Forget headline-making data breaches and DoS attacks;…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • 2021 Prediction #1: Ransomware Victims Will Face Sanctions

    2021 Prediction #1: Ransomware Victims Will Face Sanctions

    Jennifer LuPiba
    Jennifer LuPiba

    The first of my eight predictions for 2021 was that ransomware victim organizations will face government lawsuits. Indeed, as I noted in my previous post, authorities like the U.S. Department of the Treasury (USDT) have already announced they will file…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • Integrating InTrust event log forwarding with ELK SIEM

    Integrating InTrust event log forwarding with ELK SIEM

    Sergey.Goncharenko
    Sergey.Goncharenko

    Elastic stack demonstrated itself as a leader for open source big data analysis, data collection, and visualization products. The stack which is usually abbreviated with ELK contains the following components

    • Elastic search - data indexing and analysis…
    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • New in Quest InTrust - Real-Time alert notification in the Event Log

    New in Quest InTrust - Real-Time alert notification in the Event Log

    Sergey.Goncharenko
    Sergey.Goncharenko

    Quest InTrust is a very powerful log management framework which also contains a lot of possible ways to notify about triggered alerts:

    • Email alerts
    • SCOM connector
    • Alert Reports in SRS
    • Alerts in SQL DB 
    • Web Interface for Alert management - InTrust Monitoring…
    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • How InTrust can drastically reduce RDP attack attempts frequency

    How InTrust can drastically reduce RDP attack attempts frequency

    Sergey.Goncharenko
    Sergey.Goncharenko

    It is well known for anyone who tried to run a VM in the cloud that RDP port if left opened will be attacked with massive waves of brute-force attempts from IPs all around the world.

    I run a detection lab in Azure and at some point, it just started to…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • Top 3 Logs to Spot and Stop COVID-19 Workstation Attacks for Your Remote Workforce

    Top 3 Logs to Spot and Stop COVID-19 Workstation Attacks for Your Remote Workforce

    Brian Hymer
    Brian Hymer

    As mentioned in an earlier post, COVID-19 phishing and malware campaigns are on the rise. Cyber criminals are exploiting the opportunity of today’s chaos:

    • the flood of new endpoints connecting to your network via VPN,
    • the subsequent and sudden…
    • over 5 years ago
    • Blogs
    • Microsoft Platform Management
  • 6 Quick VPN Security Wins To Do Now

    6 Quick VPN Security Wins To Do Now

    Jennifer LuPiba
    Jennifer LuPiba

    VPN. VPN. VPN. This pushed-aside and closely guarded technology has suddenly seen a resurgence during the COVID-19 work-from-home directives; but instead of just your executives receiving access, IT organizations are opening up access to all remote employees…

    • over 5 years ago
    • Blogs
    • Microsoft Platform Management
  • New in Quest InTrust - Suspicious process creation detection

    New in Quest InTrust - Suspicious process creation detection

    Sergey.Goncharenko
    Sergey.Goncharenko

    In recently released Update 1 for InTrust 11.4.1 there is a hidden gem – Suspicious process was started rule, it allows detection of hidden steps that ransomware and malware would do to achieve persistence, hide their tracks and disable protection…

    • over 5 years ago
    • Blogs
    • Microsoft Platform Management
  • Your Ticket to the IT Dance: The Endpoint Compliance Two-Step [New Paper]

    Your Ticket to the IT Dance: The Endpoint Compliance Two-Step [New Paper]

    Viv.OBrien
    Viv.OBrien

    Who says IT administrators can’t dance? It turns out that IT asset management and compliance boils down to a two-step, which almost anybody can do.

    Sure, there’s a difference in style between the quick-quick-slow-slow of country and the left-come…

    • over 5 years ago
    • Blogs
    • Unified Endpoint Management
  • Want to see if someone is attempting a known CVE in your infrastructure? Just collect logs

    Want to see if someone is attempting a known CVE in your infrastructure? Just collect logs

    Sergey.Goncharenko
    Sergey.Goncharenko

    Something really cool about honeypots and deception technology, in general, is that you can see a hacker or a penetration tester in action with very little false positive notifications. Deception also can help with detecting yet unknown threats that cannot…

    • over 5 years ago
    • Blogs
    • Microsoft Platform Management
  • Vulnerable apps for Microsoft Teams will expose sensitive corporate data: 2020 Predictions (3 of 7)

    Vulnerable apps for Microsoft Teams will expose sensitive corporate data: 2020 Predictions (3 of 7)

    Jennifer LuPiba
    Jennifer LuPiba

    The meteoric rise of Microsoft Teams, and the apps users freely downloading into it, will create more access vulnerabilities for your network. In part 3 of a 7 part series diving in-depth in to my 2020 predictions (see all 7 predictions here ), we’ll…

    • over 5 years ago
    • Blogs
    • Microsoft Platform Management
  • View related content from anywhere
  • More
  • Cancel
<>
  • Company
    • About Us
    • Buy
    • Contact Us
    • Careers
    • News
  • Resources
    • Industry Insights Blog
    • Communities
    • Customer Stories
    • Documents
    • Events
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • Training & Certification
    • Support Services
  • Social Networks
    • Facebook
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center
  • 会社名
    • 会社情報
    • 購入
    • お問い合わせ
    • 採用情報
    • ニュース
  • リソース
    • ブログ
    • お客様の事例
    • ドキュメント
    • イベント
    • ビデオ
  • サポート
    • プロフェッショナルサービス
    • サポートの更新
    • テクニカルサポート
    • トレーニングと認定資格
    • サポートサービス
  • ソーシャルネットワーク
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • 「法務」
  • ご利用規約
  • 個人情報保護方針
  • コミュニティのフィードバックとサポート