About Nele Nikolaisen

Nele Nikolaisen is a content manager at tenfold. She is also a book lover, cineaste and passionate collector of curiosities.

TISAX Certification – Requirements, Levels & Costs

By |2022-07-19T10:01:24+02:0004 / 08 / 2021|Data Privacy|

Faster, better, and ultra-high-tech: The automotive industry is booming. To guarantee high standards throughout the planning and manufacturing process, manufacturers work very closely with their suppliers, often involving them directly in product development processes. To do so, however, they have to pass on highly sensitive data. But the loss or misuse of this information [...]

File Server Migration: Get Your File Server Back in Shape Now!

By |2022-07-19T10:05:41+02:0007 / 07 / 2021|Active Directory|

Microsoft® Windows is to IT departments like air is to humans. Well, maybe not quite as dramatic, but you really couldn’t imagine one without the other. And using Windows inevitably means you’ll be dealing with permissions, too – and lots of them! Permissions in the Active Directory, permissions on file servers and permissions on [...]

Secure Password Transmission With tenfold

By |2021-07-08T15:31:55+02:0021 / 06 / 2021|tenfold News|

When you create a new user account in Active Directory, SAP or any other system, you have to set an initial password for the account. If you’re using tenfold to cover this process, the software generates a random password that complies with the password policies of the system you are creating the account for. [...]

Active Directory Permission Management Explained

By |2022-09-16T15:10:12+02:0016 / 06 / 2021|Active Directory|

Microsoft® Windows is to IT departments like yin is to yang, like whiskey to coke, like grass is to sheep. It’s a symbiosis and the existence of one without the other is almost unimaginable. But being joined at the hip doesn’t automatically make the relationship a healthy one – and the widespread use of [...]

Azure Active Directory: What Is Azure AD?

By |2021-12-21T13:15:58+01:0031 / 03 / 2021|Cloud|

Join the cloud revolution! Between Microsoft 365, Azure AD and Cloud IAM – there's a lot going on in the Microsoft universe at the moment. And to some, the imminent move to the cloud is a cause for uncertainty: can Azure AD really deliver the same functionalities as the on-prem Active Directory? The short [...]

Modify Plus: Secure NTFS Permission Endpoints

By |2021-01-22T15:56:14+01:0022 / 01 / 2021|Active Directory|

To grant users access to files and folders on Windows drives, admins can use either share permissions or NTFS permissions. NTFS (New Technology File System) is the more common method, though, as it allows a more granular approach to granting permissions. Read on to learn how to use the “Modify Plus“ option to further [...]

Principle of Least Privilege: Access Management and Data Protection

By |2022-07-19T10:06:53+02:0012 / 01 / 2021|Data Privacy|

The principle of least privilege or POLP, sometimes also known as the principle of minimal privilege or least authority, is a best practice in the field of information security. It demands that each user and application is only assigned the minimum level of access required to perform their duties. POLP ensures that users do not accumulate [...]

SAP and AD: Make the Connection With Access Management

By |2020-12-13T10:53:19+01:0003 / 12 / 2020|Active Directory|

Corporations and organizations of a certain size usually rely on some form of ERP software to optimize their business processes. The undisputed market leader in this field is the German company SAP, which currently provides over 100 solutions for various business areas. Several companies even have multiple SAP systems running concurrently. SAP is an [...]

Exchange Mailbox Permissions: How to Track & Manage Mailbox Delegation

By |2022-07-19T10:09:13+02:0004 / 11 / 2020|Active Directory|

A new employee has joined your company! Aside from adding them in Active Directory, this also means creating a new Exchange mailbox for the fresh hire. Easy enough. Personal mailboxes are fairly straightforward. The tricky part comes later, when it’s time to check which additional mailboxes and folders a user has been given access [...]

Reference Users – An Underestimated Risk

By |2022-07-19T10:07:43+02:0027 / 10 / 2020|Data Privacy|

“Meet our new team member, Sarah. She’ll be needing same privileges as Gary, please.” What’s that noise, you ask? Oh, those are just the alarm bells chiming at the sound of the above briefing. Today, we’re going to explore the concept of reference users (also referred to as user templates) and discuss why they [...]

Go to Top