project database

Security Threats in Healthcare

Now that the HIMSS conference has wound down, folks are starting to try to make sense of what, by all accounts, was a massive amount of new and important information to digest. One of the nuggets that I pulled out was a pressing and real concern for security in the healthcare infrastructure.   The concern was…

project database

Did Someone Forget to Deprovision Active Directory User Account?

Jackson Shaw wrote an amusing but oh-too-true story about a user who left his company, came back two years later and STILL had an Active Directory user account.  In fact, this happened to me with an old employer.  There is nothing worse than seeing all the emails that customers had sent over the previous two…

project database

Active Directory synchronization: a video how-to

In the previous chalk-talk, I discussed making dynamic Active Directory security groups but I ignored an elephant in the room….what if Active Directory isn’t accurate?  What is the point of dynamically managing Active Directory group membership if you are querying against bad and/or faulty data?  To make this important functionality work, Active Directory has to…

project database

Active Directory group expiration and lifecycle

Every group has its day.  But for Active Directory groups, sometimes those days seem endless.  That is because groups (whether security groups or distribution lists) are usually only needed for a certain time period but there is no simple way to end them.  In the past, the best practice seemed to have been delete it…

project database

Force An Email Signature Based On Active Directory Group Membership

Most large corporations use Microsoft Group  Policy Objects (GPOs) to force a signature onto employees’ email.  Usually it is a bit of legal mumbo-jumbo (that is the technical term, laymen may use something more descriptive) that states that you had better be the correct person that this email was sent to and it’s not our…

project database

Do Less And Provide Better Service! Active Directory Self Service To The Rescue.

I just read a fascinating Q&A over at Information Week.  The topic was why CIO’s should pay more attention to their helpdesk functions.  Probably the most compelling reason is that something like 84% of users formulate their impressions of how well IT is doing its job from their interactions with the service desk! The question…

project database

How to Make Active Directory Group Dynamic

They say a picture is worth a thousand words, so a youtube video of GroupID in action should be worth a thousand dynamic Active Directory security groups.  As part of Imanami’s never-ending quest to bring AD group management to light for the marketplace, we recorded a short video how-to for automating AD security group membership…

project database

Distribution Lists Managed by Security Groups

Active Directory and Exchange services enable security groups to manage distribution lists. However, the capabilities around groups owning other groups are limited. Table Of Contents Why Distribution Lists are Managed by Security Groups? How Distribution Lists are Managed by Security Groups Use Cases for Distribution List Management via Security Groups List of Common Group Attributes…

project database

Active Directory Group Hijacking Solved with Workflow

The example we gave when designing the group hijacking feature for GroupID was absurd.  Say you owned an Exchange distribution list designed to discuss cookbooks and somebody else owned a distribution group designed to discuss the Anarchist Cookbook…very different sets of users with most likely a very different set of discussions. If the owner of the…

project database

Free Active Directory Reporting Tool — GroupID Reports

Active Directory is central to most IT infrastructures.  You manage users, computers, groups, contacts, access, authentication, and lunch orders with it.  Well, maybe not lunch orders but it wouldn’t be too hard with a good web-based self-service tool, some AD synchronization, and a fax gateway.  The problem would eventually be: how do you report on…