Auditor for Active Directory delivers security intelligence about what’s going on in Active Directory and Group Policy. The following are some of the features:
Comprehensive change auditing : Detects all changes in your Active Directory and Group Policy and provides the critical who, what, when and where details and before and after values.
Logon auditing : Facilitates access control to critical systems by reporting on both failed and successful logons and displaying the full logon history of any user.
Reporting on current configurations : Shows the current state of your users and groups, their permissions in Active Directory, your GPOs and their settings, and more, so you can easily compare them to a known good baseline.
Active Directory security and compliance : Provides out-of-the-box reports aligned with controls from a wide range of standards, including PCI DSS, HIPAA, SOX, GDPR, GLBA, FISMA/NIST, CJIS and more.
Group Policy monitoring : Reports on changes to audit policy settings and other Group Policy modifications with full details and before and after values.
Alerts on threat patterns : Empowers you to respond in minutes to critical AD changes, repeated failed logons and other threats that put your environment at risk.
Non-intrusive architecture : Enables you to audit Active Directory changes and logons without agents so the auditing process never degrades performance or causes downtime.
Get Answers to many crucial questions are buried deep in your Active Directory change logs. Who deleted an account? Who added an account to a Domain Admins group? Who reset a user’s password?
Netwrix AD Auditor
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
Versatile log file analysis optimized for network usage reporting to get the right report delivered to the right person. Network devices generate huge amount of log files that can be turned into...
Dramatic growth in the use of cloud-based email for the enterprise brings with it an array of security risks, including susceptibility to sophisticated attacks such as ransomware, phishing and...
Passwords valid for only a one-time use reduces the risk of compromising a user’s identity.
Strong authentication methods typically involve dynamically generated OTPs or certificate and...
Strong perimeter security is an essential prerequisite to successfully protect your business’s networks and corporate applications. This requires a level of vigilance that takes time, effort and...
Get complete visibility into what’s going on in your Windows server environment with server configuration comparisons to a last known “good” baseline and monitor all changes made to them. Report on...
Zero-day and ransomware protection against advanced attacks for your devices including identifying hosts with infected bots. Prevent, protect and quickly respond to advanced attacks including sending ...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions