say_hello

Say hello to the new Varonis.com

Varonis.com is looking a bit different today… we’re excited to launch our new, redesigned website. And it’s all for you. We’re bringing you an updated site that’s clean, gets to the point, and lets you find what you need. We’ve updated our branding, simplified our messaging, and are bringing you an overall better web experience. …

The Difference Between Organizational Units and Active Directory Groups

Active Directory loves hierarchy. Domains, Organizational Units (OUs), groups, users, and so forth. Sometimes it can be confusing—how do I best structure my AD? We’ve written a bit about domains (How do I name my domain? What happens if I rename my domain?), but today our focus will be on the difference between OUs and groups….

Resources for a Junior Sysadmin Straight Out of College

Graduation is just a few months away! To prepare for your first job as a Junior Sysadmin, we have a few tips that will make you stand out: Before you graduate, take advantage of these free tools for students: Microsoft Student Developer Program GitHub Student Developer Pack All sysadmins should be equipped with basic security…

Someone deleted my file. How can I find out who?

If you’ve ever been tasked with recovering a lost file or folder and had to explain exactly what happened (Who moved or deleted it? When did it happen? Why?), you know how annoyingly time-consuming it can be. And sometimes you simply don’t have any good answers. All you can do is restore from backup. How…

The Journey to File Permission Perfection  

More devices than ever. More platforms to choose from. An expanding universe of data choices that can be both exciting and confusing at the same time. Tablets, phablets, laptops, iOS, Android, Windows, UNIX/Linux file servers, and NAS devices. Add SharePoint, Dropbox, Google Drive, and LinkedIn to the mix. These are all awesome platforms for allowing…

How can I find out which Active Directory groups I’m a member of?

The ability to administer and maintain up-to-date user lists and groups is critical to the security of an organization. There are a number of different ways to determine which groups a user belongs to. First, you can take the GUI approach: Go to “Active Directory Users and Computers”. Click on “Users” or the folder that…

rename domain active directory

Risks of Renaming Your Domain in Active Directory

As a sysadmin, there might be moments where you’ll find the need to change, merge, or rename your domain. There are many reasons why you might need to do this, for instance: an organizational restructuring, merger, buyout or expansion. Keep in mind that a rename is not designed to accommodate forest mergers or the movement…

What's the difference between hacking and phishing

What’s the Difference between Hacking and Phishing?

Because I’ve boldly assigned myself the task to explain hacking and phishing, I feel compelled to define both terms concisely because, as Einstein’s been quoted countless times, “If you can’t explain it simply, you don’t understand it well enough.” Simply put, in my opinion: Hacking is using exploits to gain access to something you do…

keys

On Authentication

The basis of any modern security system is authentication—ensuring someone is who they say they are.  By far, the most prevalent means of authentication in use today was invented in the 1960s: the username and password. In the ensuing five decades, so much has changed: computers aren’t kept in glassed off rooms, hard drives aren’t the size of…

Automate Exchange Distribution List Management

From a business perspective, distribution lists (DLs) for email communications are a powerful and well-understood concept in IT. And they are popular: Exchange admins have voted with their right-clicks, creating lots of these Active Directory objects in their corporate domains. DLs speed up overall collaboration and leverage the power of groups to answer questions, share…