Amakiri

Bio:

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

The Best Active Directory Automation Tools

By Amakiri Welekwe on September 6, 2024

In today’s rapidly evolving IT landscape, efficient management of Active Directory (AD) is crucial for maintaining organizational security and operational effectiveness. Active Directory, the backbone of identity management and network access in many enterprises, can be a complex system to manage manually. As organizations grow and their IT infrastructures become more complex, the need for […]

Understanding File Server Permissions

By Amakiri Welekwe on September 5, 2024

In today’s digital landscape, data security and efficient resource management are crucial for any organization. An organization’s file server provides a centralized location for storing and managing files. File servers not only store critical information but also facilitate access to it by multiple users and applications, making them indispensable in both small businesses and large […]

How To See Active Directory User Login History (And Audit Logon Logoff Data)

By Amakiri Welekwe on September 5, 2024

Active Directory (AD) underpins many contemporary IT environments by managing user accounts, computers, and permissions. Monitoring and auditing user login history in AD is essential for maintaining security, ensuring compliance, and diagnosing potential issues within an organization. This article will walk you through viewing Active Directory user login history and auditing logon and logoff data. […]

The Best IT Service Management Tools

By Amakiri Welekwe on August 1, 2024

IT Service Management (ITSM) is a framework or a set of processes used by organizations to design, deliver, manage, and improve the way IT services are provided to their customers. It encompasses various activities including incident management, problem resolution, change management, and asset management, all aimed at aligning IT services with business needs and ensuring […]