Centrify Server Suite Management Tools



Similar documents
What s New in Centrify Server Suite 2015

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

Centrify Suite Enterprise Edition Online Training

Centrify Cloud Connector Deployment Guide

What s New in Centrify Server Suite 2014

Centrify DirectAudit Jump Start Service

identity management in Linux and UNIX environments

What s New in Centrify Server Suite 2013 Update 2

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Automating Cloud Security with Centrify Express and RightScale

Windows Least Privilege Management and Beyond

Google Apps Deployment Guide

Centrify OS X Basic Jump Start

Centrify Identity and Access Management for Cloudera

How To Manage A Privileged Account Management

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Quest One Identity Solution. Simplifying Identity and Access Management

An Overview of Samsung KNOX Active Directory and Group Policy Features

The Centrify Vision: Unified Access Management

Best Practices for Adding Macs to Microsoft Networks

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Virtualization Case Study

Windows Security and Directory Services for UNIX using Centrify DirectControl

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centrify Identity Service and Mac - Online Training

Centrify Suite 2012 Express

CA Federation Manager

Active Directory and DirectControl

Managing UNIX Generic and Service Accounts with Active Directory

Centrify-Enabled Samba

How to best protect Active Directory in your organization. Alistair Holmes. Senior Systems Consultant

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

managing SSO with shared credentials

Speeding Office 365 Implementation Using Identity-as-a-Service

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Directory-as-a-Service Primer (DaaS)

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Privileged Account Management Mar3n Cannard, Security Solu3ons Architect

Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

Vistara Lifecycle Management

Centrify Server Suite Health Check

Active Directory Management. Agent Deployment Guide

Module 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway

NCSU SSO. Case Study

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

What s New in Centrify DirectAudit 2.0

Dynamic Service Desk. Unified IT Management. Solution Overview

Centrify Server Suite 2014

Challenges in Deploying Public Clouds

Google Identity Services for work

How To Achieve Pca Compliance With Redhat Enterprise Linux

Deploy Remote Desktop Gateway on the AWS Cloud

Quest Software Product Guide

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Designing and Implementing a Server Infrastructure MOC 20413

Enforcing Enterprise-out Security for Cloud Servers

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK

Privileged Account Access Management: Why Sudo Is No Longer Enough

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

AD Integration options for Linux Systems

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Citrix Systems, Inc.

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Centralized Mac Home Directories with ExtremeZ-IP

FREQUENTLY ASKED QUESTIONS

IBM Tivoli Endpoint Manager for Lifecycle Management

BeyondInsight Version 5.6 New and Updated Features

The Top 5 Federated Single Sign-On Scenarios

IBM Tivoli Endpoint Manager for Lifecycle Management

EXAM Designing and Implementing a Server Infrastructure. Buy Full Product.

Transcription:

SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor (CIRA) (Available without Server Suite) Access Manager and MMC Snap-In Group Policy Object Editor Report Center Audit Analyzer (Enterprise and Platinum Editions only) Deployment Report Utility Through you can also single sign-on to systems to edit local files or perform other tasks. Although installing Centrify on a UNIX or Linux system is a straightforward task, organizations that want to deploy to dozens or hundreds or thousands of systems will find it easier to use the to guide them through the process. With you can: Discover UNIX and Linux systems within your environment either on-premise or in the cloud and select which systems should integrate with Active Directory. Analyze the systems' readiness for integration with Active Directory. The can, for example, identify DNS issues in your network that would prevent the system from reaching an Active Directory domain controller. Deploy and install or upgrade the appropriate Centrify Server Suite components. Join the systems to Active Directory, establishing a trusted relationship between that system and Active Directory. Gain single sign-on to remote systems via PuTTY, VNC, RDP or WinSCP. Centrally manage local accounts and groups on systems discovered through, whether those systems have been joined to Active Directory or not. Centrally discover systems and integrate them into Active Directory. Connect to Remote Computers Through you can also single sign-on to systems to edit local files or perform other tasks. 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. DSH001387EN-12222014 PAGE 1

Centrify Identity Risk Assessor (CIRA) Automate the discovery of identity-related risks in your Linux and UNIX server environment. CIRA quickly identifies critical violations of identity and access management best practices and provides the insight to help you understand how to prioritize and mitigate these identity-related risks. With CIRA you can: Discover hidden issues in the Red Hat, AIX, Solaris, and Ubuntu infrastructure, such as inconsistent password polices across servers, excessive use of local root and service accounts, and other fundamental security weaknesses that can be hard to identify and correct. Drill into the findings from CIRA s comprehensive survey. Per-test reporting of issues found provides account and privilege level data per server, and recommendations for risk mitigation. Compare your findings against recommended best practices developed by Centrify through the experience of over 5,000 customer deployments. Gain new insight to help prioritize and mitigate identity-related vulnerabilities and potential audit and compliance issues. Download Centrify Identity Risk Assessor (Does not require Server Suite) CIRA Survey Linux and UNIX servers to identify access control-related issues. Gain Insight Compare identity-related vulnerabilities and potential compliance issues to best practices. The Centrify Server Suite enables you to retire redundant and legacy identity stores by managing UNIX, Linux and Mac identities through Active Directory. The Migration Wizard accelerates your deployment by helping you import user and group information from sources such as NIS maps and local files into Active Directory. The Migration Wizard checks for duplicate IDs and gives you options for resolving conflicts, such as creating new Active Directory user or group objects or mapping the incoming IDs to existing Active Directory objects. Easily import NIS maps and local files into Active Directory, resolve conflicts, and create users and groups. 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. DSH001387EN-12222014 PAGE 2

Access Manager and ADUC Extension Centrify Server Suite Management tools includes two Windows-based administrator's tools: our Access Manager and an MMC-based Active Directory Users and Computers (ADUC) property extension. With these interfaces you can configure the UNIX profile of Active Directory users (such as their UNIX ID, home directory and shell), manage computer properties and manage Centrify Zone membership. The ADUC property extensions are particularly useful for delegated administration. For example, Windows-based IT help desk personnel could be enabled to use ADUC to update users' UNIX profile without giving them administrative access to advanced Centrify features. Through the Access Manager you also have access to all Centrify advanced features, such as creating and managing Centrify Zones, importing identities and running reports. Access Manager The Access Manager provides centralized access to all advanced Centrify Server Suite features, including Zone setup, roles and rights definition, and reporting. Group Policy Object Editor Centrify's advanced support for Group Policy for UNIX, Linux and Mac enables you to enforce consistent configuration and security policies across heterogeneous systems. Server Suite s streamlined Group Policy Object Editor interface makes it easy to create and edit Group Policies within the standard GPO Editor. It provides a rich editing environment for many policies where multiple lines of text need to be entered or edited after initial entry, such as firewall policies. Group Policy Editor Create and edit Group Policies used to control settings for everything from servers to mobile devices. 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. DSH001387EN-12222014 PAGE 3

Report Center Centrify reports give you detailed, global visibility over access rights, privileges and security policies across heterogeneous systems. The Report Center provides pre-defined reports that answer the most common questions asked by compliance auditors, such as who has access to a set of computers in a Zone, what systems a specific user has access to, and what privileged commands users have been granted on specific systems. You can define custom reports as well. Report Center Quickly run reports for compliance auditors or others. Centrify Audit Analyzer (Available in Enterprise and Platinum editions only) Quickly find and replay privileged user sessions on Windows, Linux and UNIX systems. Centrify Server Suite, Enterprise Edition collects detailed logs of user activity on Windows, Linux, and UNIX servers, including the commands entered as well as the system responses. The Centrify Audit Analyzer is useful for IT personnel with a range of responsibilities: Compliance auditors can use it to verify that access control policies are being enforced, by building queries and reports; for example, reports that show activity on specific systems or activity by specific users. Audit Analyzer Available in Enterprise and Platinum editions only) Quickly find and replay privileged user sessions on Windows, Linux and UNIX systems. IT security personnel can use it to search for specific types of activity, such as commands to change passwords or insert accounts, and they can monitor user sessions in real time. Compliance auditors, security personnel and IT operations staff can replay historical or current sessions to do forensic analysis of suspect sessions or identify issues in sessions that may have contributed to a system outage. Centrify Deployment Report Utility The Centrify Deployment Report Utility collects information about the Centrify software you have deployed, including how many licenses you have available, and the number of licenses currently in use. You can use this utility to generate a report that provides a summary and detailed information about the different types of licenses you have purchased for identity consolidation, access control, privilege management, and auditing and where active licenses are being used. 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. DSH001387EN-12222014 PAGE 4

Contact Centrify Centrify provides unified identity management across data center, cloud and mobile environments that result in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify s unified identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization s existing identity infrastructure to enable single sign-on, multifactor authentication, privileged identity management, auditing for compliance and enterprise mobility management. SANTA CLARA, CALIFORNIA: +1 (669) 444-5200 EMEA: +44 (0) 1344 317950 ASIA PACIFIC: +61 1300 795 789 BRAZIL: +55-11-3958-4876 LATIN AMERICA: +1-305-900-5354 Email Web sales@centrify.com http://www.centrify.com 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. DSH001387EN-12222014 PAGE 5