Auditor for Active Directory delivers security intelligence about what’s going on in Active Directory and Group Policy. The following are some of the features:
Comprehensive change auditing : Detects all changes in your Active Directory and Group Policy and provides the critical who, what, when and where details and before and after values.
Logon auditing : Facilitates access control to critical systems by reporting on both failed and successful logons and displaying the full logon history of any user.
Reporting on current configurations : Shows the current state of your users and groups, their permissions in Active Directory, your GPOs and their settings, and more, so you can easily compare them to a known good baseline.
Active Directory security and compliance : Provides out-of-the-box reports aligned with controls from a wide range of standards, including PCI DSS, HIPAA, SOX, GDPR, GLBA, FISMA/NIST, CJIS and more.
Group Policy monitoring : Reports on changes to audit policy settings and other Group Policy modifications with full details and before and after values.
Alerts on threat patterns : Empowers you to respond in minutes to critical AD changes, repeated failed logons and other threats that put your environment at risk.
Non-intrusive architecture : Enables you to audit Active Directory changes and logons without agents so the auditing process never degrades performance or causes downtime.
Get Answers to many crucial questions are buried deep in your Active Directory change logs. Who deleted an account? Who added an account to a Domain Admins group? Who reset a user’s password?
Netwrix AD Auditor
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
Comprehensive enterprise-grade mobile security that protects iOS and Android devices, apps, and the networks they depend on from advanced mobile threats like malicious apps, man-in-the-middle...
Monitor your IT environment health and get a view of your servers, VMs, network devices, and applications performance from a unified dashboard. Evaluate your capacity by using historic data to plan...
Security for all your Datacenter virtualization platforms to decreases the risk and spread of lateral (east-west) threats. Protect your assets and data within the industry leading Hypervisors (VMware ...
Strong perimeter security is an essential prerequisite to successfully protect your business’s networks and corporate applications. This requires a level of vigilance that takes time, effort and...
Secure your perimeter from risky activity, suspicious traffic, and advanced threats.
Reporstar Technologies make use of perimeter defense technologies like Next Generation Firewalls, Intrusion...
A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment. Reportstar Technologies solutions provide a detailed analysis of the state of your...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions