Auditor for Active Directory delivers security intelligence about what’s going on in Active Directory and Group Policy. The following are some of the features:
Comprehensive change auditing : Detects all changes in your Active Directory and Group Policy and provides the critical who, what, when and where details and before and after values.
Logon auditing : Facilitates access control to critical systems by reporting on both failed and successful logons and displaying the full logon history of any user.
Reporting on current configurations : Shows the current state of your users and groups, their permissions in Active Directory, your GPOs and their settings, and more, so you can easily compare them to a known good baseline.
Active Directory security and compliance : Provides out-of-the-box reports aligned with controls from a wide range of standards, including PCI DSS, HIPAA, SOX, GDPR, GLBA, FISMA/NIST, CJIS and more.
Group Policy monitoring : Reports on changes to audit policy settings and other Group Policy modifications with full details and before and after values.
Alerts on threat patterns : Empowers you to respond in minutes to critical AD changes, repeated failed logons and other threats that put your environment at risk.
Non-intrusive architecture : Enables you to audit Active Directory changes and logons without agents so the auditing process never degrades performance or causes downtime.
Get Answers to many crucial questions are buried deep in your Active Directory change logs. Who deleted an account? Who added an account to a Domain Admins group? Who reset a user’s password?
Netwrix AD Auditor
As a dynamic and motivated company ReportStar Technologies commits itself to achieving superior levels of support and service which develop lasting partnerships beneficial to our clients and their business.
ReportStar Technologies assists clients worldwide to build advanced cyber defenses and risk management capabilities. We develop, integrate and support our solutions.
Versatile log file analysis optimized for network usage reporting to get the right report delivered to the right person. Network devices generate huge amount of log files that can be turned into...
Protection against Viruses and Malware threats for your endpoints and servers. This solution delivers granular endpoint protections, including anti-ransomware and exploit prevention technologies in a ...
Strong perimeter security is an essential prerequisite to successfully protect your business’s networks and corporate applications. This requires a level of vigilance that takes time, effort and...
Security for all your Datacenter virtualization platforms to decreases the risk and spread of lateral (east-west) threats. Protect your assets and data within the industry leading Hypervisors (VMware ...
Dramatic growth in the use of cloud-based email for the enterprise brings with it an array of security risks, including susceptibility to sophisticated attacks such as ransomware, phishing and...
The core feature of SIEM technologies is the ability to gather security data from the critical assets residing on your network and to present that data as actionable information. Reportstar...
ReportStar House, 114 4th Street, Parkmore Sandton, Gauteng, South Africa, 2196
© Copyright 2018 Reportstar Technologies All rights reserved
Terms & Conditions