SysAdmin Magazine

SysAdmin Magazine is a free source of knowledge for IT Pros who are eager to keep a tight grip on network security and do the job faster

Cream of the crop: five blogs by five Sysadmin Blog Awards winners from all over the globe – all in the special edition of SysAdmin Magazine.

  • Step-by-step Guide to Respond to a Ransomware Infection
  • IT Pro’s Quick Tip: Adding Cloud to a Group via Office 365 PowerShell
  • Which IT Certifications Are Most Valuable?
  • Free Tool of the Month: Event Log Manager
April 2017

The March issue of SysAdmin Magazine highlights four IT pros’ lives and the toughest problems they face at work, they also shed light on the worst breaches and what preventative measures you can take.

  • What It’s Like to Be a Color Blind Guy in IT
  • Notorious Breaches and Hacks: What Went Wrong?
  • Introducing a Brand New Ransomware Strike Game
  • Free Tool of the Month: Inactive User Tracker
March 2017

The February issue of SysAdmin Magazine provides you with a number of time-tested solutions that you can use for a more effective data security strategy.

  • UBA Best Practices and Data Security Tips
  • Survival Heads-Ups to Protect Data Against CryptoLocker
  • Introducing SysAdmin Blog Awards
February 2017

The January issue of Sysadmin Magazine focuses exclusively on Microsoft Exchange, both on premises and in the cloud. Discover the best ways to maintain system security and optimize your Exchange environment.

  • Guide to Enhancing Your Exchange Online Security
  • 5 Free Exchange Security Tools
  • 2017 IT Security Predictions 
  • How-to and Free Tool for IT Pros
January 2017

In the December issue of SysAdmin Magazine you'll find the best articles of 2016.

  • AD and Exchange Security Best Practices
  • Research Lab: 2016 Cloud Security Report
  • Defending Against Crypto-Ransomware Guide
  • Top Security Freeware Tools for SysAdmins
December 2016

The Halloween edition of SysAdmin Magazine is all about best practices and strategies that sysadmins use to protect their IT infrastructure against the wicked spells of insider threats, ransomware, and security incidents.

  • Spooky Infographics Highlighting Free Security Tools
  • Dirty Secrets of Security Permissions in AD 
  • Hypnotizing Password Policy in Azure AD
  • The Best Halloween Costumes for Courageous
November 2016

October edition of SysAdmin Magazine offers a wide range of helpful and time-tested tips and tools for these unsung heroes:

  • IT Risks Infographics
  • Group Policy Troubleshooting Techniques
  • Office 365 Password Policy Rules
  • How-tos and Technical Guides
October 2016

For this edition of SysAdmin Magazine, we have gathered handy visibility tips that are meant to help administrators improve IT environment security in their organization.

  • 3 visibility tips from IT experts
  • 7 ransomware myths
  • Infographics about shadow IT
September 2016

Ransomware is everywhere! This special edition of SysAdmin Magazine will be your handy guide in fighting against ransomware attacks.

  • Quick Tweaks to Prevent Ransomware Attacks
  • Ransomware protection Using PowerShell
  • Ransomware Survival Guide 
August 2016

In this issue of SysAdmin Magazine, you will find analytical articles and useful tips on how to secure your IT systems and set stronger controls over the activity in the IT environment

  • Why is an insider threat still a danger?
  • How to detect who has installed the software?
  • Free tools and exam study guide, handy for IT pros
July 2016

June issue of SysAdmin Magazine is all about data security.  New cloud security trends, how-toes for IT pros, freeware tools and much more. 

  • Articles: Security trends, Exchange Online security 
  • Infographics: IT Risk Survey Report 2016
  • Best Practices: Active Directory security
  • How-to: Detect Changes to OUs in Active Directory
June 2016

The majority of companies think that the adoption of the cloud is unsafe, because it lacks visibility into user activities. Learn about advanced techniques that help enhance organization’s IT security both on premises and in the cloud.

  • IT news: Introducing Netwrix Auditor 8.0
  • Articles: Cloud security breaches
  • Exchange best practices
  • Free tool of the month
May 2016

In current issue of SysAdmin Magazine we discuss ways to add more value to SIEM reports:

  • Articles: SIEM limitations and passing compliance audits
  • Infographics: SIEM Efficiency Survey 2016
  • Tech Guide: Account lockout policies
  • How-to: Detecting who deleted a GPO
April 2016

Passing IT compliance audits can be long and painful. Get the best practices and tips how to prepare your organization for IT auditors:

  • Keynotes from the last ENISA Security Report
  • IT compliance standards guide: what is better for your organization?
  • Tips how to monitor logon events using MS in-built tools
  • How-to about detecting deleted accounts in Active Directory
March 2016

Get advices and tips on maintaining organization’s security and protecting IT systems from cyberattacks:

  • Articles: Cybercrime patterns of 2016, steps to protect your network from cybercriminals
  • Analytics: Challenges for IT managers, Dell-EMC merge
  • How-to: Detecting who added a user to Domain Admins Group
  • Guide: Getting user logon session times
February 2016

Read the Best Articles of 2015:

  • 7 security threat predictions for 2016
  • Results of our recent State of IT Changes Survey
  • How to fix Exchange server within minutes
  • How to detect who read a file on a file server
January 2016

Discover tips from IT pros in the security news department:

  • Articles: privileged identity management
  • Tips: two-factor authentication, disaster recovery plan, event log forwarding
  • How-to: detecting disabled user deletions, detecting who read a file on file server
December 2015

The November issue of “SysAdmin Magazine” will give you lots of useful IT tips on SQL Server security.

  • 3 prime rules for keeping SQL Server safe
  • News about recent data breaches 
  • How-to to detect changes on SQL server
  • Guide about SQL server native auditing
November 2015

Discover tips in this SysAdmin Magazine editions to organize your approach to compliance audits and prevent a significant security event.

  • PCI DSS, HIPAA, FISMA, GLBA, SOX compliance tips
  • New Powershell scrips from Adam Bertran
  • How-to about monitoring user logons in a domain
October 2015

The September issue of “SysAdmin Magazine”  is a special edition completely focused on the puzzles you can solve with PowerShell scripting.

  • PowerShell use for event log monitoring 
  • Technical tips about PowerShell security
  • How-tos about expired passwords and user accounts
September 2015

Read this issue of SysAdmin Magazine, which is focused on the latest data breaches and give some thought to expert advice on precaution processes like auditing and monitoring.

  • Lastest data breaches and its' causes
  • PowerShell scripting for event logs filtering and querying
  • Native auditing of DHCP server
  • How-tos about deletions of DHCP reservations and AD user accounts
August 2015
  • VMware environment security tips
  • News about latest data breaches
  • VMware server native auditing
  • Password management tools
July 2015

This edition of SysAdmin Magazine is full of technical tips, as well as overviews by our top contributors giving advice on the best ways to keep your data safe by implementing a good password management policy.

  • Top advices on password management
  • PowerShell scripts to store and retrieve passwords
  • How to detect password changes in AD
  • Data governance tips
June 2015

Dig into the May issue of SysAdmin Magazine! This one is full of quality advice about most ways to secure Windows Server: in a form of articles, guides and how-tos. 

  • Advices on securing Windows Server
  • How-tos about completing daily tasks involving Windows Server
  • Quick Reference Guides for Windows Server auditing
  • Recent IT news in the world of compliance and security
May 2015

Current issue of SysAdmin MAgazine is “farced” with useful IT tips and tricks to establish and maintain security of Exchange server.

  • Ways of keeping Exchange data safe
  • How to solve full access permissions issues
  • Proper native auditing of Exchange Server
  • Recent malware threats  
April 2015