Secure and Efficient Log Management with Quest OnDemand

Similar documents
An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

10.2. Auditing Cisco PIX Firewall with Quest InTrust

Direct Migration from SharePoint 2003 to SharePoint 2010

Migrating Your Applications to the Cloud

Go Beyond Basic Up/Down Monitoring

Eight Best Practices for Identity and Access Management

Taking Unix Identity and Access Management to the Next Level

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

Key Methods for Managing Complex Database Environments

Foglight for SQL Server

Quest Management Agent for Forefront Identity Manager

Using Stat with Custom Applications

Proactive Performance Management for Enterprise Databases

Six Steps to Achieving Data Access Governance. Written By Quest Software

Toad for Oracle Compatibility with Windows 7 Revealed

How Password Lifecycle Management Can Save Money and Improve Security

Quest One Privileged Account Appliance

An Innovative Approach to SOAP Monitoring. Written By Quest Software

The Active Directory Management and Security You ve Always Dreamed Of

Desktop to Cloud. Browser Migration in the Enterprise. Written By Quest Software, Inc.

The Case for Quest One Identity Manager

6.0. Planning for Capacity in Virtual Environments Reference Guide

Five Tips for Effective Backup and Recovery in Virtual Environments

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

Quest Application Performance Monitoring Implementation Methodology

Top Seven Tips and Tricks for Group Policy in Windows 7

SharePoint Nine Key Features

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Enterprise Single Sign-On 8.0.3

Image-Based Data Protection: Simply Better Data Protection

Enterprise Single Sign-On Installation and Configuration Guide

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?

8.0. Quick Start Guide

Are You Spending More than You Realize on Active Directory Management?

Quest Site Administrator 4.4

A Governance Guide for Hybrid SharePoint Migrations. Written By Chris Beckett Information Systems Architect and SharePoint Solutions Specialist

The Quest Cloud Automation Platform

Achieving ISO/IEC Compliance with Quest One Solutions for Privileged Access. Written By Quest Software, Inc.

SHAREPOINT Best Practices for Preparing for SharePoint Migrations. Colin Spence IN FOUR EASY STEPS. Written by

Top Five Reasons to Choose Toad Over SQL Developer

Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard

Protecting and Auditing Active Directory with Quest Solutions

Quest Support: vworkspace Troubleshooting Guide. Version 1.0

6.5. Web Interface. User Guide

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer

Best Practices Guide for IT Governance & Compliance

Exchange 2010 and Your Audit Strategy

Enterprise Single Sign-On. The Holy Grail of Computing

IT Consolidation in the Public Sector: How to Achieve IT Optimization

Best Practices for SharePoint Development and Customization

Foglight Foglight Experience Viewer (FxV) Upgrade Field Guide

Desktop Virtualization: Best Bet for a Dwindling IT Budget?

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Benchmark Factory for Databases 6.5. User Guide

8.6 Migrating to Exchange 2010

Controlling & Managing Super User Access

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Migrating Lotus Notes Applications to Microsoft Office 365 and SharePoint Online

Quest Solutions for PCI Compliance

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Data Center Consolidation Strategies for the Federal CIO

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

Quest Site Administrator 4.4

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Quest One Password Manager

System Requirements and Platform Support Guide

Authentication Services 4.1. Authentication Services Single Sign-on for SAP Integration Guide

Quest ActiveRoles Server

4.0. Offline Folder Wizard. User Guide

for Oracle User Guide

Choosing the Right Active Directory Bridge Solution

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Unified and Intelligent Identity and Access Management

formerly Help Desk Authority Quest Free Network Tools User Manual

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

Spotlight on SQL Server 7.0. Reporting and Trending Guide

Meeting the Challenge of Log Management for Unix and Linux Systems

8.0. Forest Edition. Deployment Guide

Foglight. Dashboard Support Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Defender Delegated Administration. User Guide

2011 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

Extending Native Active Directory Capabilities to Unix and Linux

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

FOR WINDOWS FILE SERVERS

SharePoint User Adoption

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Quest Migration Manager 3.2

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

Enterprise Single Sign-On Getting Started with SSOWatch

4.7. Administrator Guide

Dell InTrust Preparing for Auditing Cisco PIX Firewall

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Top 10 Tips for Optimizing SQL Server Performance

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Transcription:

Secure and Efficient Log Management with Quest OnDemand TECHNICAL BRIEF

2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Quest Software, Inc. ( Quest ). The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656 www.quest.com E-mail: legal@quest.com Refer to our Web site for regional and international office information. Trademarks Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure, Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight, ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer, DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile, InTrust, Invirtus, itoken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats, Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!, PowerGUI, Quest Central, Quest vtoolkit, Quest vworkspace, ReportADmin, RestoreADmin, ScriptLogic, Security Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab, Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vautomator, vcontrol, vconverter, vfoglight, voptimizer, vranger, Vintela, Virtual DBA, VizionCore, Vizioncore vautomation Suite, Vizioncore vbackup, Vizioncore vessentials, Vizioncore vmigrator, Vizioncore vreplicator, WebDefender, Webthority, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. Other trademarks and registered trademarks used in this guide are property of their respective owners. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 1

Contents Abstract... 3 Introduction... 4 Quest OnDemand vs. On-Premises: Choosing the Right Solution... 5 About Quest OnDemand... 5 Benefits of Quest OnDemand... 5 Auto-deploy... 5 Auto-update... 5 What about Security?... 6 OnDemand Log Management... 7 Installing and Configuring OnDemand Log Management... 7 Using OnDemand Log Management... 9 Secure and Automated Event Monitoring in Real Time... 9 Reviewing Key Log Management Information... 9 Pre-defined Event Searches... 10 Customize Your Search... 10 Reporting... 11 Alerting... 12 Conclusion... 13 For More Information... 14 Technical Brief: Secure and Efficient Log Management with Quest OnDemand 2

Abstract Small- to medium-size businesses can realize significant benefits by using Quest OnDemand, Quest s cloud-based IT management solutions. Quest OnDemand solutions securely provide Windows management services on a pay-as-you-go basis without requiring traditional on-premises deployment or maintenance simply download a small agent to your existing infrastructure and you re ready to go. This technical brief explains the benefits and security of the Quest OnDemand solutions, and then details how to install, configure and use OnDemand Log Management. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 3

Introduction Managing the IT network of a small- to medium-size business (SMB) with a limited budget is challenging and critical. Because many system tools and applications depend on the Windows infrastructure, even an hour of system downtime can have disastrous consequences on the company s productivity and bottom line. Quest Software s OnDemand solutions provide the SMB with an affordable alternative that simplifies IT management, reduces staffing costs, and improves system performance. OnDemand solutions do not require traditional on-premises deployment or maintenance and are designed to ensure 24x7 availability. This technical brief explains the benefits and security of the Quest OnDemand solutions, and then describes installing, configuring and using OnDemand Log Management. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 4

Quest OnDemand vs. On-Premises: Choosing the Right Solution About Quest OnDemand Quest OnDemand solutions enable you to focus on your core business rather than devoting your time and resources to managing your infrastructure. For organizations that have made the strategic decision to manage all or part of their Windows environments with cloud-based services, adopting an SaaS strategy provides important security and management capabilities while eliminating application maintenance and minimizing upfront costs. Benefits of Quest OnDemand With Quest OnDemand solutions, you can spend less time and budget managing your Windows infrastructure. OnDemand solutions seamlessly and securely provide the solutions you need with flexible subscription-based pricing, enabling you to affordably spread your investment over time. There are significant benefits to using the Quest OnDemand solutions: Auto-deploy Quest OnDemand solutions use a web-based delivery method. A small agent is automatically deployed; there is no need to download or install any software. This simple deployment process ensures that your solutions are quickly implemented and available for use, providing you with a fast ROI. OnDemand solutions are scalable to any size environment. Auto-update New functionality, updates and bug fixes are deployed automatically you no longer have to install updates or patches. Single Point of Access Registering for a Quest OnDemand solution is fast and easy and all solutions can be accessed from a single portal. Quest OnDemand solutions also provide role and permissions management, enabling you to delegate access to both internal and external users. Security Assurance OnDemand solutions use encryption and SAML-based security access controls to ensure your data is protected in transit and at rest. The solutions also use the Windows Identity Foundation (WIF) for identity management, authentication and authorization, and your data is securely stored on the Windows Azure platform. Remote Access OnDemand solutions are accessible anytime, from any location, with a supported web browser. Predictable Costs Subscription-based pricing enables you to immediately access the solution you need, while spreading your investment over time. For more information on choosing the right solution, read the white paper, The Business Case for Software as a Service, written by Microsoft MVP Don Jones. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 5

What about Security? Some organizations may be concerned about the security of data stored in the cloud, but in reality security is a major reason why they should consider moving to the cloud. Data hosted in the cloud with Quest OnDemand solutions has a very high level of security: Security of data in transit Data stored using a Quest OnDemand solution is transferred to a Microsoft Azure data center using SSL encryption. Security of data in storage After transit, your data is stored in a separate data container protected with a SAML-based access control system. Security of the physical data center The physical data center is subjected to stringent security requirements and must pass regular audits and certifications, including SAS 70 Type I and Type II as well as ISO/IEC 27001:2005. Quest OnDemand s data security is illustrated in Figure 1: Figure 1. The transfer and storage of company data from the company s workstation to the Quest OnDemand service using Microsoft s Azure platform For more information about security, read the white paper, Addressing Security and Data Ownership Issues when Choosing a SaaS Provider, written by Microsoft MVP Greg Shields. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 6

OnDemand Log Management Meeting IT compliance and security auditing requirements means reporting on user activity on the network often to multiple stakeholders with disparate reporting requirements. In order to deliver these audit reports, organizations must collect, store and report on data in Windows event logs. This is challenging for understaffed IT departments in small- and medium-size businesses, where IT professionals may have to wear many hats at once. On-premises log management solutions can be expensive to support and maintain, with ever-growing hardware and storage requirements. The IT staff must provide backup and recovery, manage patches, and install and maintain antivirus software and updates. Administrators in SMBs need an automated, flexible and secure solution without the overhead of traditional on-premises deployment and maintenance. Installing and Configuring OnDemand Log Management In a short process, you can download and deploy the OnDemand agent in your Windows environment. You need to grant the agent administrative rights so that it can collect the event logs. You can opt to install additional agent modules that provide extended auditing of user access to critical infrastructure resources such as Active Directory and File Systems. Figure 2. You can install extended auditing for Active Directory and File Systems Technical Brief: Secure and Efficient Log Management with Quest OnDemand 7

Once the agent is in place, you select the type of event logs you want to collect: Figure 3. Choose which event logs to collect The log data is streamed securely via SSL transfer to your company s specific compartment in the Microsoft Azure data center. You are the only one who will have the ability to access or grant others access to this data. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 8

Using OnDemand Log Management Secure and Automated Event Monitoring in Real Time Quest OnDemand Log Management monitors events in real time, enabling you to respond immediately to problems and ensuring adherence to compliance regulations. All collected events are stored in a secure OnDemand repository, reducing the volume of event log storage needed on premises. And since Quest OnDemand Log Management automates the collection of event logs, administrators are available for more strategic projects. Reviewing Key Log Management Information You can get an overview of key log management statistics from the home page dashboard: Figure 4. The OnDemand Log Management home page provides key event statistics at a glance Technical Brief: Secure and Efficient Log Management with Quest OnDemand 9

Pre-defined Event Searches Just click on one of the pre-defined searches and start your investigation with only events you need: Figure 5. Pre-defined searches let you quickly start the investigation Customize Your Search Tune your search by simply typing words or phrases you re looking for, or by applying easy to use filters to selected event columns like the user name or event ID: Figure 6. Searching for a specific event is quick and easy Technical Brief: Secure and Efficient Log Management with Quest OnDemand 10

Reporting Any search that you created can be easily exported to several output formats including those supported by many applications, CSV files and printer-friendly PDF documents: Figure 7. Results of any search can be exported to a variety of file formats The resulting reports can be handed over to external or internal auditors as a proof of compliance to requirements imposed by various IT affecting regulations like PCI, DSS, SOX, HIPAA and others: Figure 8. Reports can serve as an evidence of compliance with internal policies or external regulations Technical Brief: Secure and Efficient Log Management with Quest OnDemand 11

Alerting Just like with reports, you can easily turn any search to an alert to be delivered to the inbox of the designated administrator every time the event you deemed important is detected by OnDemand Log Management on any of the monitored computers: Figure 9. Recieve email alerts as critical events happen Technical Brief: Secure and Efficient Log Management with Quest OnDemand 12

Conclusion Every organization, large or small, needs to collect, store, report and alert on event data. On-premises log management solutions may work well for large organizations with extensive IT staffs and budgets, but small- to medium-size businesses often do not have those resources. To help, Quest offers cloud-based IT management solutions that securely provide Windows management services on a pay-as-you-go basis without requiring traditional on-premises deployment or maintenance. Quest OnDemand Log Management frees your organization from the cost and complexity of managing log storage by storing your event log data in a secure repository off-site. OnDemand Log Management also automates the collection of event logs and monitors events in real time, enabling you to reduce onsite administrative work by enabling you to respond immediately to problems and comply with internal policies and external regulations. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 13

For More Information To learn more about Quest OnDemand Log Management or to sign up for a free 30-day trial, please visit www.quest.com/ondemand. Technical Brief: Secure and Efficient Log Management with Quest OnDemand 14

TECHNICAL BRIEF About Quest Software, Inc. Quest Software (Nasdaq: QSFT) simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest solutions for application management, database management, Windows management, virtualization management and IT management, go to www.quest.com. Contacting Quest Software PHONE 800.306.9329 (United States and Canada) If you are located outside North America, you can find your local office information on our Web site. EMAIL MAIL sales@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around-the-clock coverage with SupportLink, our Web self-service. Visit SupportLink at https://support.quest.com. SupportLink gives users of Quest Software products the ability to: Search Quest s online Knowledgebase Download the latest releases, documentation and patches for Quest products Log support cases Manage existing support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information and policies and procedures. 5 Polaris Way, Aliso Viejo, CA 92656 PHONE 800.306.9329 WEB www.quest.com EMAIL sales@quest.com If you are located outside North America, you can find local office information on our Web site. 2011 Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. TBW_SecureEfficientLogMngmt_US_EC_20110308