Quest InTrust. Change auditing and policy compliance for the secure enterprise. May 2008. Copyright 2006 Quest Software



Similar documents
7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Netwrix Auditor. Administrator's Guide. Version: /30/2015

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Dell InTrust 11.0 Best Practices Report Pack

Netwrix Auditor for Windows Server

White Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software

Quest Software Product Guide

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Netwrix Auditor for Active Directory

Reports, Features and benefits of ManageEngine ADAudit Plus

Enforcive / Enterprise Security

Netwrix Auditor for SQL Server

How to Audit the 5 Most Important Active Directory Changes

NetWrix SQL Server Change Reporter

JIJI AUDIT REPORTER FEATURES

Stellar Active Directory Manager

NetWrix SQL Server Change Reporter

Reports, Features and benefits of ManageEngine ADAudit Plus

Active Directory Change Notifier Quick Start Guide

Best Practices for Auditing Changes in Active Directory WHITE PAPER

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

ChangeAuditor 5.7. What s New

Admin Report Kit for Active Directory

NETWRIX EVENT LOG MANAGER

Agency Pre Migration Tasks

NETWRIX EVENT LOG MANAGER

Enterprise Archive Managed Archiving & ediscovery Services User Manual

How To Improve Your Business

Windows Server 2012 / Windows 8 Audit Fundamentals

Netwrix Auditor for File Servers

Netwrix Auditor for Exchange

Enforcive /Cross-Platform Audit

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

What s New Guide. Active Administrator 6.0

LT Auditor+ for Windows

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Enterprise Reporter Report Library

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

Blackbird Management Suite Blackbird Group, Inc.

10 Things IT Should be Doing (But Isn t)

Group Policy and Organizational Unit Re-Structuring Template

Copyright Quest Software, Inc All rights reserved. DISCLAIMER TRADEMARKS

QRadar SIEM 6.3 Datasheet

Keeping Tabs on the Top 5 Critical Changes in Active Directory with Netwrix Auditor

Role Based Access Control for Industrial Automation and Control Systems

NETWRIX IDENTITY MANAGEMENT SUITE

The Age of Audit: The Crucial Role of the 4 th A of Identity and Access Management in Provisioning and Compliance

Netwrix Auditor for SQL Server

THE POWER OF GROUP POLICY

Exchange Auditing in the Enterprise

These guidelines can dramatically improve logon and startup performance.

Contents of This Paper

NetWrix Logon Reporter V 2.0

IT SECURITY GURU PRODUCT REVIEW Netwrix Auditor 6.5

An Oracle White Paper January Oracle Database Firewall

How To Ensure Financial Compliance

Netwrix Auditor. Сomplete Visibility into IT Infrastructure Changes and Data Access. netwrix.com netwrix.com/social

Administration of Symantec Enterprise Vault 10.0 for Exchange. Version: Demo. Page <<1/12>>

Secret Server Qualys Integration Guide

BusinessObjects Enterprise XI Release 2 Administrator s Guide

Data Classification Technical Assessment

Designing and Implementing a Server Infrastructure

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions

Top 10 Most Popular Reports in Enterprise Reporter

Sarbanes-Oxley Control Transformation Through Automation

PROPALMS TSE 6.0 March 2008

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. Publication Date: March 17, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Netwrix Auditor for Windows File Servers

Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days

Filling the Gap in Exchange Auditing. Written by Randy Franklin Smith Monterey Technology Group, Inc.

How to configure Incoming Enabled Libraries in MOSS2007 RTM using Exchange 2007 in an Active Directory Domain.

10.6. Auditing and Monitoring Quest ActiveRoles Server

Implementing HIPAA Compliance with ScriptLogic

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Quest InTrust for Active Directory. Product Overview Version 2.5

IBM Tivoli Compliance Insight Manager

SonaVault Archiving Software

Netwrix Auditor. Role-Based Access. Version: /27/2015

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Active Directory Manager Pro New Features

# Is ediscovery eating a hole in your companies wallet?

and Active Directory Adding, Changing and Deleting Accounts, Compiling Addresses for Mail Lists

NETWRIX USER ACTIVITY VIDEO REPORTER

Extending SharePoint 2013 for Management

NetWrix Exchange Change Reporter

Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background

Transcription:

Quest InTrust Change auditing and policy compliance for the secure enterprise May 2008 Copyright 2006 Quest Software

Quest is the Thought Leader in Active Directory Named Microsoft Global ISV Partner of the Year! 2007 2004 Mature Products Working with Microsoft s enterprise directory (NT & AD) since 1993 The Migration Expert Over 20 Million user accounts migrated by Quest Most Managed Users Over 45 Million user accounts managed using Quest s Active Directory solutions Strategic Investment Multiple patents and patents pending for our technology Trusted Partner Over 7,000 companies look to Quest to help manage their Active Directory Single Vendor for Your AD requirements Migration, Availability, Auditing & Reporting, Efficiency, Extending the Reach Cross-platform 1

Quest InTrust Architecture Overview Store Real-Time Reports Changes InTrust Server SQL Server SRS Quest Knowledge Portal InTrust Repository Collect Event Data Securely Correlate heterogeneously Prove it to the auditors Compressed, long-term storage Report intelligently Real-time Monitoring (Alerts, Remediation) 2

Quest Knowledge Portal 3

The InTrust Framework Collect event data securely Correlate heterogeneously Report intelligently Prove it to the auditors Compressed, long-term storage Real-time Monitoring (Alerts, Remediation) 4

The InTrust Framework The InTrust framework provides a basis for an organization s GRC (Governance, Risk and Compliance) systems, and leverages modular functionality via Plug-in s to provide a deeper level of auditing, reporting and security than available natively. Built upon the core InTrust framework, there are InTrust Plug-ins for: Active Directory, File Access, Exchange, SharePoint (coming late 08) All of the plug-ins leverage the InTrust framework to: Collect event data securely Correlate heterogeneously Report intelligently: Prove it to the auditors Deliver advanced archival, Long-term storage (compressed, admissible in court) Enforce policies for email compliance and ediscovery Improve system security and performance Reporting through a common web-based platform Provide Real-time Monitoring 5

Further Benefits of the InTrust Family Advanced auditing and remediation capabilities via InTrust Plug-ins Active Directory Exchange File Access SharePoint Report intelligently Predefined and custom reports Regulatory reports mapped to SOX, HIPAA, PCI and COSO Improve system security Keep more data at your fingertips Consolidated Reporting via the Knowledge Portal 6

Active Directory Information Servers and Workstations Applications Exchange Microsoft Identity Lifecycle Manager Active Directory Lightweight Directory Service Databases SQL Server Oracle Files & Folders CIO Auditors Security Officer Administrators COSO, HIPAA, PCI, SOX Real-Time Alerting Soon to be released CoBit*, ISO17799*, FFIEC* ITIL*, BASEL II*, J-SOX*, OMB A-123 Compliance Lifecycle 7

Problems with MS Native auditing of AD MS Directory Services auditing is difficult to configure/manage. Policy settings and ACL Audit entries must be applied locally to each OU you wish to monitor. Native auditing events are incomplete. Events on Permission changes (Delegate Control) lack critical details. Incomplete auditing of Group Policy changes No auditing of Schema container changes / extensions. Event overload due to inheritance 8

Why InTrust for Active Directory is Superior to Native Windows Auditing! No audit configuration needed Audit virtually all changes to AD Permission changes (Delegated Control) with complete details! Full auditing of Group Policy changes Changes, links, even changes made directly via SYSVOL! No Event Overload on permission changes due to inheritance. Even audit Configuration & Schema container changes! Gain additional insight: Before & After values for each change Source IP address / Computer name Bonus!: Protect critical objects outside of MS Security! GPOs, Root level OUs, Service accounts, groups, Anything in AD! 9

ITAD GPO Changes Subreport example 10

Problems with MS Native Object Access (file) auditing: Native Auditing is Time consuming and difficult to configure/manage Policy settings can be pushed out via GPO, but ACL Audit entries must be applied locally to each folder you wish to audit Events are often incomplete, redundant or incorrect To MS: Everything is a file! Long vs. Short filename Event overload due to inheritance Events on Permission changes lack critical details No Move event data 11

Why InTrust plug-in for File Access is Superior to MS Native Auditing! Centralized Audit configuration Configure audit settings on all file servers from a single console Complete, correct event data Files are files, and folders are. Folders! Always shows the long file name Eliminates redundant audit records Folder permission changes include scope of change Duplicate events are suppressed, reducing storage requirements Complete permission change details Who s permission and what changed Before and after values Includes Move events! 12

InTrust plug-in for File Access drill down functionality! All recently deleted files and by user All file access activity performed by that user. 13

Problems with MS Exchange Auditing: Impossible to natively track all change details to Exchange Stores Microsoft Native auditing does not provide detailed information on: Non-owner mailbox access and specific activity related to this access Changes to permissions at the client level Changes to permissions to the Configuration Store Native auditing does not provide detailed change tracking of permission changes made to a mailbox within AD Critical to both security and compliance objectives 14

Why InTrust plug-in for Exchange is Superior to MS Native Auditing! The only solution on the market that tracks non-owner Mailbox activity Logon to other user's mailbox Logon to other user's mailbox via OWA Open folder Read, Modify, Delete other user's emails (objects in user's mailbox) Tracks send-as activity Tracks Permission changes Mailbox and Folder permissions. Delegates and Alternate Recipient Management! MICROSOFT DOES NOT DO THIS NATIVELY! 15

Additional Auditing from InTrust for Exchange: Track Exchange Server Configuration Changes Delivery restrictions Authentication, Connections and Access control changes for: HTTP IMAP SMTP POP3 Enabled services Assures that organizational assets are protected and secured from unwanted administrator actions 16

Sample InTrust Plug-in for Exchange Reports Folder permission changes Non-owner mailbox read attempts 17

InTrust for Exchange Example: Inappropriate Mailbox Access Alert via email whenever Non-owner mailbox activity is detected that did not come from a known Executive Assistant Copyright 2006 Quest Software

19

InTrust for Exchange Example: Mailbox Permission / Delegate Changes Alert via Email any time a Mailbox has a permission or delegate change Copyright 2006 Quest Software

21

Quest approach. Quest approach to Enterprise security. Copyright 2006 Quest Software

Overall vision.

ActiveRoles Server 24

Quest InTrust Change auditing and policy compliance for the secure enterprise Thank You! Copyright 2006 Quest Software