SysAdmin Magazine

SysAdmin Magazine is a free source of knowledge for IT Pros who are eager to keep a tight grip on network security and do the job faster

In this edition, delve into managing AD groups. Learn the differences between security and distribution groups, master group scope, and follow best practices:

  • AD Security Groups vs Distribution Groups
  • Group Scope in Active Directory
  • Active Directory Group Naming: Examples & Best Practices
  • Zero Trust Security in AD and Entra ID Groups

In this issue, discover top registry cleaners, learn about AD monitoring tools, and find expert advice on selecting the best SharePoint reporting tools.

  • A Comprehensive Guide to AD Monitoring Tools
  • Top Active Directory Management Tools
  • Find the Best Registry Cleaner to Clean Your Windows Registry
  • A Brief Guide to Help You Choose the Best SharePoint Reporting Tool

In this issue, you will learn how to set up your Windows security settings, harden and clean up Active Directory, effectively execute password management:

  • Top 6 Windows security settings to configure right now.
  • How to clean up your Active Directory.
  • Top strategies to harden your Active Directory infrastructure.
  • Tips for better password management.

In this issue, find out how to strengthen your desktop management and security to be well-prepared to defeat even the most determined cybersecurity adversaries.

  • Secrets to GPO Item Level Targeting
  • Windows Update for Business – Setting Up and Building Out WuFB Rings
  • Group Policy Loopback problems and solutions
  • How to set up the  most important Windows Security settings to keep your organization safe

In this issue, discover expert tips and best practices to fortify your AD environment by eliminating clutter and mitigating security risks. 

  • How to clean up your Active Directory
  • Top strategies to harden your Active Directory infrastructure
  • How to back up and restore Group Policy objects (GPOs)


In this issue, we share best practices for password management to help you defend your corporate credentials against compromise and misuse. 

  • Tips for better password management
  • Finding weak passwords in Active Directory
  • NIST password guidelines

From tips on how to create a robust AD password policy to tricks for detecting network vulnerabilities, this edition recaps the top reads of 2022 to help you prepare for next year’s challenges.

  • How to set and manage Active Directory password policy
  • Handling open ports securely and finding vulnerabilities
  • Using Active Directory’s AdminCount attribute to find privileged accounts

Leaving the corporate network vulnerable is a luxury no organization can afford. This edition of SysAdmin Magazine will help you implement network security best practices to prevent or promptly detect attacks and protect your business.

  • What network security is and how to fortify it
  • Identifying critical network assets as required by CIS Control 1    
  • Keeping open ports secure and finding vulnerabilities

To reduce your AD security risks, you need to ensure your AD is clean, properly configured, closely monitored and tightly controlled. This edition of Sysadmin Magazine is designed to help you achieve these goals.

  • Active Directory Certificate Services: Risky Settings and How to Remediate Them
  • Active Directory Configuration Strategies for Stronger Security
  • Active Directory Object Recovery Using the Recycle Bin

Even though passwords are a pain to remember and manage, for any organization they are still a first line of defense. In this issue, we explore how to maintain a strong password security posture and defend your corporate passwords against attacks.

  • How to set and manage Active Directory password policy
  • 5 top Local Administrator password solution (LAPS) tips
  • What is password spraying, and how can you spot and block attacks?

The “Best of 2021” edition highlights the hottest articles of the year, from the best AD management tools to the top server monitoring software. Don’t wait until Christmas Day; grab your perfect gift right now!

  • Best Active Directory management tools
  • Best server monitoring software tools
  • GPO item-level targeting secret

If you don't want to become just another victim of a nasty IT creature, then consider the following tools and best practices that all IT monsters hunters should keep in their arsenal.

  • How to defend against ransomware with effective change control
  • How to detect Pass-the-Hash attacks
  • How to prevent a data breach

On the very special occasion, Sysadmin Day, we’re giving you proven tools that will help you effectively manage your AD, monitor your network, and keep your servers healthy.

  • Best Active Directory management tools
  • Top network monitoring tools of 2021
  • Best server monitoring tools

Come to the light side of permissions! Get best practices for configuring permissions to your critical systems and data to reduce your cybersecurity risks.

  • Top 11 NTFS permissions tools for smarter administration
  • Understanding the risk of Active Directory permissions and shadow access
  • Privileged access management in Windows Server

From remote work challenges to malware prevention — this edition will help you contemplate the top issues of the year and prepare for next year’s IT challenges.

  • 5 tips for hardening Microsoft Teams security
  • Systems administrator salary: How much can you earn?
  • How to prevent malware attacks: 10 security tips


As Halloween approaches, the witches and goblins at Netwrix have gathered together to offer a bony handful of scarily good guides and tips to fight off your worst database IT nightmares.

  • Getting started with database security
  • Top 5 SQL server monitoring tools
  • Real-life database horror stories

In this edition, we’ll walk you through MS Teams security and management best practices so that you can leverage the power of the tool without sacrificing security.

  • 5 tips for hardening Microsoft Teams security
  • External users and guest access in Microsoft Teams
  • Managing Microsoft Teams using PowerShell

This special edition is centered around the things that sysadmins really care about: money, career development, and pains that torture sysadmins on a daily basis.

  • Systems administrator salary: How much can you earn?
  • 10 network monitoring tools for sysadmins
  • Top things that sysadmins really hate
  • Top certifications to begin and advance your tech career


This edition clearly explains the most important facets of SharePoint Online administration so you can create a secure and effective cloud environment.

  • SharePoint Online administration, step by step
  • Managing SharePoint Online using PowerShell
  • Easy and secure file sharing for business
  • How to ensure secure guest access in Office 365

This edition provides best practices that will guide you through the unfamiliar terrain of supporting an expanding remote workforce while safeguarding your critical and sensitive data.

  • 5 Tips for Hardening the Security of Microsoft Teams
  • Office 365 File Sharing Security: OneDrive for Business, SharePoint and Teams  
  • How to Configure the Office 365 Audit Log from the Security and Compliance Center

PowerShell enthusiast? Then this special edition is for you! We will prove that the good old PowerShell still has some aces up its sleeve.

  • Top 10 PowerShell commands for Group Policy
  • Most useful PowerShell commands for SharePoint
  • 10 most useful PowerShell commands for Office 365
  • Best PowerShell commands for effective password management

The edition explores key virtualization security concepts, explains common security issues, and provides robust strategies and mighty tools to help you keep your virtual environment safe.

  • The basics of virtualization security you need to know
  • VMware security best practices
  • How to detect suspicious VMware logon attempts
  • Top 5 VMware incidents you need visibility into

Carefully curated by our in-house elves (aka the SysAdmin Magazine team), this "Best of" edition includes all the hottest articles from the year.

  • Network devices explained
  • 10 Group Policy PowerShell commands
  • Managing SharePoint item-level permissions
  • Top 3 audit challenges and how to overcome them

The October edition of Sysadmin Magazine is a great tool for keeping difficult things simple.

  • Top 5 free tools for account lockout troubleshooting
  • Getting Group Policy object precedence right
  • How to monitor user logоns in a domain

In the September edition, find out how to successfully manage Cisco devices with a pack of our practical tips, commands and how-to’s.

  • Basic Cisco Router Configuration
  • How to Manage and Save Running Config on Cisco Devices
  • Cisco Troubleshooting Commands at Your Service
  • Why Native Network Device Auditing Is Not Enough