ManageEngine ADSolutions We Think. We Innovate. We dare to differ. So that you go home happy. Apu Pavithran Product Consultant apupavithran@manageengine.com
ADSolutions: Innovations We Introduced Pioneers in offering an entire range of Active Directory & Exchange Management Tools as a Web-Based Portfolio! Manage your Active Directory and Exchange Server From Anywhere! Anytime! All you need is a Browser to run our software! No dependencies! No separate console installations!
Innovations in AD & Exchange Management Template-Controlled One-Stop Provisioning One-click & absolute AD De-provisioning On-the-fly AD Management/ AD Shortcuts Noninvasive AD Delegation with Task Controllers Workflow in AD Management Controlled Automation for crucial/cumbersome AD tasks
User provisioning.from this mess. CSV IMPORT. Tedious scripts for bulk user creation Numerous revisits to set right entitlements Losing yourself in the maze of configuration Shutting between Exchange Server and AD, or OCS/LCS and AD
All-Encompassing Templates!
Template-Controlled User Provisioning: The Advantages Really quick and easy. Allows you to implement a standard in provisioning methods. No margin for errors. Directly in line with several renowned IT control frameworks such as COSO/COBIT
One-click & Absolute AD De-provisioning When it s time to go, it s time to go.. You can create delete policy which will clear all the belongings of the user account from AD. You can clear off his home folders too. Makes Active Directory Safe & Secure.
On-the-fly AD Management & AD Task Shortcuts META GROUP, a famous research organization, states that on average an AD administrator spends 29% of his IT time in manipulating USER accounts! That s why we give you on-the-fly AD Management! All the reports that you will ever need have been prepackaged & become actionable items! They come with TASK SELECTION, TARGET SELECTION, & BUTTONS AD Management in CLICK OF A BUTTON is now possible!!!!
User account management is all about finding the right user account and changing its properties. And you spend 30% of your time doing
AD Delegation: The Noninvasive Approach with Supreme Control over Delegated Tasks/ Agents Our Delegation Framework Never touches AD permissions to delegate a task to user Creates Task Controllers (role-based control) to get done only what s necessary Administrators retain absolute control over tasks delegated Enables even technically naïve users, such as HR personnel, to function at the level of an AD administrator s efficiency.
Helpdesk Roles: The Task Controller
Advantages of this delegation model, task controllers All these permissions to do AD tasks are PRODUCT-ONLY rights. We never touch AD! A delegated technician s role can be drilled-down to OU level. A delegated technician can only do what YOU want him to do. Through Task Controllers, you can absolutely control what a delegated technician can see, use, or do in the product! With the help of Task Controllers and Templates, even your HR personnel can create user accounts with Exchange mailboxes! We don t need computer scientists anymore! Even my kids, 11 and 12, can do it! Margaret Sandler CareTech Solutions
Workflow in an AD Management Tool We added a Real Workflow Engine to Active Directory Management! There is no need to install a third party Workflow Engine! Offers extra measure of transparency & security in AD Delegation!
Advantages of Workflow Integrated AD Management Solution You can build an internal control framework (propagated by COSO/COBIT controls) Makes way for extremely secure AD Delegation Adds transparency to crucial Active Directory/Exchange management tasks Introduces review/control pit-stops in an automated AD task
Controlled AD Automation Crucial AD task can be automated. It will be a manned automation. It will follow the workflow engine implemented Automated process, for e.g., user creation/ inactive account cleanup will run but stop at the pit-stops you have defined in the integrated workflow engine
Everything you ll need for AD administration packaged into one solution Single and Bulk User/ Group Management User provisioning, De-provisioning and Re-provisioning. Computer Management, Contact Management Active Directory Clean-Up HelpDesk Delegation OU-based Administration Active Directory Reports Only (Schedulable/Compliance 6 months Oriented) into the market Management from Reports and Templates
Innovations in AD Auditing
Innovations in AD Auditing Custom Reporting Report Profiles: Based on the rules and specifications set by you, the product generates reports. Custom Alerts Administrator can also be alerted about these events when they occur
Advantage of Custom Reporting If you have specific needs for reports other than what the product has to offer, then you can create your own report extractor.
Custom Reporting in AD
What s different & New in the AD Auditing Product? File Server Failover Cluster Auditing
Innovations in IT Self-Service
A brief introduction about Self-Service Tool from ManageEngine ADSolutions: It s a 4-in-1 product that offers: Password Self-Service: End-users can self-service reset their passwords/ unlock accounts. AD Self-Service Update: Allows end-users to update their directory info without helpdesk s aid. People Search: Enables end-users to search for peers contact information. Password Expiry Notifier: Emails notifications to people about their password expiry and the need to change them. (A MUST for VPN users).
We have added customizable Forgot Password button to Windows Logon Prompt! GINA in Self-Service Password Reset
Self-Service Directory Update Regulated User Input Gatherer: Create a user interface (through drag-n-drop method) that compels users to update their directory information just the way you want!
People Search The people search option is a perfect complement to this AD Self-Service Update
ManageEngine IT Self-Service Solution comes with inbuilt Features for Quick User Adoption/Deployment/Better ROI
Exchange Reporting: The Difference
Exchange Reports what s new in them Can you get reports like these using Exchange Management Console?
Using Exchange Management Console, Can you get Mailbox Permissions Listed Neatly Like This..
All this specificity is applied to.. Mailbox Traffic Reports Mailbox Permission Reports Mailbox Content Reports Storage Reports Server Traffic Reports Public Folder Content Reports Distribution Lists Reports Distribution List Traffic Reports Custom Recipients Traffic Reports Outlook Web Access (OWA) Reports
Things that you can accomplish using our Exchange Reports These reports are like a crystal ball, gazing at which you can gain enough knowledge to: * Arrive at important decisions such as balancing load on Exchange servers * Detect anomalies such as virus attacks before they can harm the organization * Uphold the email security of your organization by detecting harmful content * Track inactive mailboxes/public folders/distribution lists and de-clutter the Exchange organization Let's take a look at few reports and how they help you do all this...
Actionable Reports & Decision Making A look at the number of messages sent by a server helps you identify the overloaded servers and the comparison surely provides an idea of where busy mailboxes should be moved to...
Exchange Reports can de-clutter your Exchange organization Inactive Mailboxes, or distribution lists, or public folder are breeding houses for trouble! Exchange Reporter Plus exposes such inactive resources and de-cluttering the organization becomes pretty easy thereafter. It's industry best practice to regularly follow these chinks in the armor and get rid of them as quickly as possible.
Content Reports & Email Security With Exchange Reporter Plus, you can fish out suspicious or irrelevant content from users' mailboxes or public folders. You can either search for particular keywords in the body of the mails or in the header. Alternately, you can even create content filters based on attachments or attachment size.
In a nutshell, our Exchange Reports help you In decision making involving crucial Exchange administrative actions such as Exchange server load balancing, traffic re-routing, etc. In setting up organizational email policy, where you can fish out unrelated or harmful content through content filtering In maintaining a secure email environment by detecting viruses and other anomalies early on before they could cause severe damage
Thank you