ADManager Plus: Active Directory (AD) is a critical part of the IT infrastructure for many businesses in South Africa. It stores important information about users, computers and groups, and it is used to control access...
- Centralized and Intuitive web-based UI
- Bulk Management of User accounts and other AD objects
- Delegates Role-based access to Help Desk Technicians
- Generates AD Reports including compliance audit reports.
- Mobile apps that empower on- the- go user management
How will AD Manager Plus help you?
- Eliminates tedious, mundane and complex tasks associated with AD Management.
- Automates routine AD Management and Reporting activities for AD Administrators.
- Facilitates Creation, Management and Deletion of AD objects in Bulk.
- Provides ‘on- the- go’ AD user management capability through its mobile apps.
- Acts as an essential resource during Compliance Audits like SOX, HIPAA, etc.
- Single and Bulk User Management
- Group Computer Management
- Help Desk Delegation
- Office 365 Management & Reporting
- Active Directory Automation
- Active Directory Cleanup
- Active Directory Reports
- Real Last Logon reports
- Exchange Management
Request quote or demo
Complete your details below to book a demonstration of this product. Or for a quote…
What customers have to say
Free Active Directory management tools: Part 5 – Replication, domain controller roles, and monitoring
Replicate information between domain controllers (DCs), identify the roles assigned to the domain controllers in your Active Directory (AD) environment, and monitor your domain controllers based on the parameters you require with the following free...
When your machine throws a “the server has exceeded the maximum number of allowed connections” message or when user accounts go stale, it is up to the IT administrators to handle it.
Creating a CSV file containing all the required attributes of your entire workforce to perform bulk actions is not only time consuming, but often error-prone.
Have you ever wondered how organisations migrate inboxes, contacts, and calendars into new Microsoft 365 user accounts? Often, a PST migration tool is used to carry out this migration.
Passwords are the first line of cyberdefense, and an organisation cannot afford to have weak passwords, poorly-configured password policies, or even worse, empty passwords. Discovering users with weak or empty passwords can be like finding...
Active Directory (AD) is a crucial identity and access management (IAM) component for many enterprises as it enables the creation, maintenance, and use of digital identities. User accounts in AD are the basis of authentication...
Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more diverse than ever. Increasing cloud adoption coupled with remote work...
While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency in disclosures from...
Why don’t help desk applications manage Active Directory (AD)? Given the wide array of features that ITSM tools natively offer, it seems like AD management should be packaged into them too.
Technology can transform education, but your IT must be able to keep up. Any threat, security breach, network congestion, downtime, or drop in user experience can throw your class into chaos.
Active Directory relies on services distributed across many, interdependent devices in different locations. To ensure consistent security throughout such a large environment, monitoring changes is essential.
Passwords are still the most popular authentication method used to grant users access to critical business resources. This is problematic because many experts no longer consider passwords a secure form of authentication.
South Africa’s Protection of Personal Information Act (POPIA), much like the EU’s General Data Protection Regulation (GDPR), outlines the policies and procedures South African organizations need to adopt to collect, process, and store personal information.
It’s easy to make Active Directory (AD) administrators uncomfortable. Just ask them about their disaster recovery plan. When faced with this question, most AD administrators will only tell you about their object recovery plan. Only a few are better prepared and have a recovery plan for...