SysAdmin Magazine

SysAdmin Magazine is a free source of knowledge for IT Pros who are eager to keep a tight grip on network security and do the job faster

Don’t rely on North Pole bureaucracy to get the gift you deserve this holiday season. Click the link below and take what is rightfully yours:  the “Best of 2018” edition of SysAdmin Magazine.

  • Top 10 most common types of cyber attacks
  • The best system administrator certifications
  • Top 10 free system administrators tools
  • How to perform IT risk assessment
December 2018

Stay two steps ahead of rogue or careless admins and other privileged users with the help of the proven techniques you’ll find in the November edition of SysAdmin Magazine.

  • Privilege abuse explained
  • How to harden privileged account security
  • Top 7 Microsoft Windows Server features for managing privileged access
  • What is privilege escalation?
  • Free tool of the month: Effective Permissions Reporting Tool
November 2018

This issue provides a time-tested kit of Windows PowerShell commands that make the job of managing Active Directory easy and almost hands free.

  • Step-by-step guide for creating new Active Directory users
  • Most useful PowerShell commands for AD group management
  • Top tips for managing OUs and moving their objects
  • The five best free Active Directory management tools
October 2018

This edition of SysAdmin magazine will definitely make you feel like you’re on cloud nine because we reveal many handy tips for managing your Office 365 environment.

  • 10 most useful Office 365 PowerShell commands
  • A step-by-step guide to provisioning Office 365 accounts
  • Why native Office 365 and Azure AD auditing is not enough
  • Webinar: How attackers eхploit Office 365 vulnerabilities
September 2018

The August edition focuses on Windows Server security, detailing a mix of new and time-tested techniques to help you protect against, detect and respond to threats in your Windows Server environment.

  • 5 ways to protect credentials in Windows Server
  • Top 5 auditing techniques for Windows Server
  • 3 key Hyper-V security features in Windows Server
  • Webinar: Top 12 events to monitor in the Windows Server security log
August 2018

We’re dedicating our Sysadmin Day Special Edition to all the unsung heroes of server rooms. This issue is packed with tips and insights that will help sysadmins grow their careers and simplify their lives.

  • Best system administrator certifications for 2018
  • Systems administrator salaries in 2018
  • [Infographic] Key facts about system administrator jobs
  • Top 10 free system administration tools
July 2018

Hackers are always lurking nearby, ready to exploit any mistake you make in order to infiltrate your network. Stay one step ahead! Learn how they think, act and hide their nasty moves.

  • Top 10 most common types of cyber attacks
  • How I hacked 40 websites in 7 minutes
  • 4 steps you should take if you have been hacked
  • [Recorded Webinar Series] A hacker explains
June 2018

Learn how to use the forces of good – data discovery and classification tools and techniques – for safeguarding your most precious content and ensuring compliance.

  • Data classification explained: Why you should care and how to perform it
  • Using RegEx to find sensitive content
  • How to manage file system ACLs with PowerShell scripts
  • Microsoft File Classification Infrastructure (FCI) explained
May 2018

In this special edition, we cover the most critical information about the GDPR to prove that it’s not your enemy, but an opportunity to excel.

  • What is GDPR: 10 frequently asked questions
  • 5 reasons why GDPR will make you stronger
  • How to: 3 steps to comply with Article 25 §2 of the GDPR
  • Recorded Webinar Series: Achieve and maintain compliance with the GDPR
April 2018

Enjoy the best posts written by five 2018 Sysadmin Blog Award winners in this special edition of our magazine.

  • The network “hack” that wasn’t to be
  • 5 cloud security mistakes to avoid
  • 13 free InfoSec training resources for IT pros
  • Top reasons why ‘carpet bombing’ of phishing email endures
  • Free tool of the month: Event Log Manager
March 2018

Discover the shocking truth about the danger of over-privileged users and learn how to mitigate the risks of privilege abuse and data exposure.

  • What to know about the threat of privileged users
  • How to detect permission changes in Active Directory
  • Key lessons learned from data breaches caused by privilege abuse
  • Free tool of the month: Effective Permissions Reporting Tool
February 2018

Discover what threatens data that resides in the cloud and learn how to protect it, with the January edition of SysAdmin Magazine.

  • Infographic: Top Cloud Security Risks and Concerns in 2018
  • Expert Tips: All You Need to Know about Azure AD Password Policy
  • Recorded webinar: Cloud Security: Who is Responsible for Your Critical Assets?
  • Quick Reference Guide: Exchange Online Auditing
January 2018

The Best of 2017 edition highlights the hottest topics of this year. This is a perfect gift that you can download and make yours—no matter how nice or naughty you’ve been.

  • The Top 5 IT Security Trends for 2018
  • New Game: Save Xmas and Data!
  • Research Lab: Top IT Risks 2017
  • Top 5 Free Tools for File Permissions Reporting
December 2017

The November edition explores the most common IT security risks and offers effective techniques for assessing and reducing them so you can always win the security race.

  • 5 Things You Need to Know about IT Risk Assessment
  • Top 7 Common Mistakes in Active Directory
  • IT News: New Netwrix Auditor 9.5 and its IT Risk Assessment reports  
  • Tool of the Month: Bulk Password Reset
November 2017

In this special Halloween edition, we’ll walk you through the scariest IT stories and instruct you how to fight the danger in the most effective way.

  • To the Hell and Back: Story of a Ransomware Survivor
  • 3 Hair-Raising Ways Departing Employees Steal Your Data
  • Monster Inside: 4 Things You Should Never Store in Your Database
  • Survival Guide for a Victim of a Horrible Hack
October 2017

Working with a tight budget? Or you are actually  enjoying saving money? This cheapskate edition of Sysadmin Magazine is exactly what you need! 

  • Top 5 Free Tools for NTFS Permissions Reporting
  • Top 5 Free Tools for Account Lockout Troubleshooting
  • How to Get Rid of Ransomware at No Cost
  • Free Tool of the Month: Effective Permissions Reporting Tool
September 2017

With the help of the powerful tips and ready-to-use how-tos that you’ll find in the August edition of Sysadmin Magazine, managing your AD monster won’t be a challenge any longer.   

  • 5 How-tos for AD optimization Using PowerShell
  • 3 Ways to Secure Service Accounts in Active Directory
  • Infographics: Top Cybersecurity Risks in the Asian-Pacific Region
  • Free Tool of the Month: Netwrix Auditor for Active Directory
August 2017

In the Special edition of Sysadmin Magazine five sysadmins from the Spiceworks community share their anecdotes and IT hacks proving how awesome and irreplaceable sysadmins are.

  • My First Day Challenge as a Sysadmin
  • Sysadmins Speak Up: 7 Reasons to Become a Sysadmin
  • Infographics: Top Cybersecurity Risks in Healthcare
  • Free Tool of the Month: Account Lockout Examiner
July 2017

The June issue of Sysadmin magazine brings you a lightsaber of IT security world – sacred PowerShell cmdlets that will move your IT infrastructure security to an intergalactic level.

  • PowerShell: Find Disabled or Inactive Users in Active Directory
  • PowerShell: Discover New Users in Active Directory
  • Infographics: Top IT Security Risks of 2017
  • Free Tool of the Month: Netwrix Auditor Free Community Edition

 

June 2017

Combat ransomware and identify aberrant insider activity faster with the tools and best practice guides we have collected for you in the May issue of SysAdmin Magazine.

  • Ransomware Removal Using FSRM and PowerShell
  • 3-Step Guide to Preventing Privilege Escalation  
  • IT News: New Netwrix Auditor 9.0 and its Alerts on Threat Patterns
  • Free Tool of the Month: Disk Space Monitor
May 2017

Cream of the crop: five blogs by five Sysadmin Blog Awards winners from all over the globe – all in the special edition of SysAdmin Magazine.

  • Step-by-step Guide to Respond to a Ransomware Infection
  • IT Pro’s Quick Tip: Adding Cloud to a Group via Office 365 PowerShell
  • Which IT Certifications Are Most Valuable?
  • Free Tool of the Month: Event Log Manager
April 2017

The March issue of SysAdmin Magazine highlights four IT pros’ lives and the toughest problems they face at work, they also shed light on the worst breaches and what preventative measures you can take.

  • What It’s Like to Be a Color Blind Guy in IT
  • Notorious Breaches and Hacks: What Went Wrong?
  • Introducing a Brand New Ransomware Strike Game
  • Free Tool of the Month: Inactive User Tracker
March 2017

The February issue of SysAdmin Magazine provides you with a number of time-tested solutions that you can use for a more effective data security strategy.

  • UBA Best Practices and Data Security Tips
  • Survival Heads-Ups to Protect Data Against CryptoLocker
  • Introducing SysAdmin Blog Awards
February 2017

The January issue of Sysadmin Magazine focuses exclusively on Microsoft Exchange, both on premises and in the cloud. Discover the best ways to maintain system security and optimize your Exchange environment.

  • Guide to Enhancing Your Exchange Online Security
  • 5 Free Exchange Security Tools
  • 2017 IT Security Predictions 
  • How-to and Free Tool for IT Pros
January 2017

In the December issue of SysAdmin Magazine you'll find the best articles of 2016.

  • AD and Exchange Security Best Practices
  • Research Lab: 2016 Cloud Security Report
  • Defending Against Crypto-Ransomware Guide
  • Top Security Freeware Tools for SysAdmins
December 2016