Tag: SECURITY

Monitoring Active Directory for Signs of Compromise

The first signs of compromise of Active Directory could be discovered early in event logs. This puts event monitoring as one of the most important activities in our network. By using PRTG, the IT Team could be alerted if Active Directory generates events related to a potential security breach from low to high criticality.

Encrypt your disk with Bitlocker

How to encrypt system partition by using BitLocker without TPM

It is highly recommended to encrypt your disk(s) and protect your data from unauthorized access. We can do it by using BitLocker which comes integrated into Windows.