Computer Security Technology Ltd

+44 (0)20 7621 7836 LinkedInTwitter

+44 (0)20 7621 7836 CSTL LinkedInCSTL Twitter

Netwrix

Netwrix is a vendor which has grown over the last few years via acquisition, the portfolio is now a large and powerful set of tools that covers Security, Compliance and IT operations.

Their approach is to provide data security products that are easy to deploy, reasonable pricing, predictable operating expenses.

Netwrix Auditor For Active Directory Security

Automate many of the security, compliance and IT operations tasks that previously required hours to complete, so you can keep your organization secure and compliant without constantly being overburdened.

Secure your Active Directory from end to end, on premises and in the cloud, with a solution that addresses all the key functions of IT security: Identify, Protect, Detect, Respond and Recover.

AD SECURITY ASSESSMENT

Strengthen your security posture by identifying and prioritizing risks, such as misconfigured security policies and improper privilege assignments — so you can remediate the gaps before attackers exploit them

ZERO STANDING PRIVILEGE

Slash your attack surface by eliminating standing privilege — a vital part of a broader Zero Trust strategy. Instead, grant admins temporary access with just enough privilege to complete the task at hand

ROLLBACK AND RECOVERY

Minimize business disruptions by rolling back unwanted changes fast and performing point-in-time restorations of entire AD domains

Domain shadow access

Risk assessment

WHAT IS ACTIVE DIRECTORY?

IT administrators have been working with and around Active Directory since the introduction of the technology in Windows 2000 Server. Windows 2000 Server was released on February 17, 2000 but many administrators began working with Active Directory in late 1999 when it was released to manufacturing (RTM) on December 15, 1999. This e-book is intended not only for beginner SysAdmins who want learn about Active Directory structure, key terminology and configurations. More experienced administrators will find a few best practices of AD management and discover the areas that are often lesser known to IT pros.

HOW TO AUDIT THE 5 MOST IMPORTANT ACTIVE DIRECTORY CHANGES

Active Directory is the central identity store and authentication provider for most networks today making it hugely critical to security. In this white paper I’ll discuss the 5 most important changes affecting the security of Active Directory, show you how to audit these events using native auditing and point out the limitations and gaps you should be aware before depending on these events. Since domain controllers generate the events covered in this white paper, you need to enable audit policies on the Default Domain Controller Security Policy GPO.

netwrix

Need more information?

Get in touch to discover, secure and manage your critical data.

Alternatively call the team today on 020 7621 7836 or email us.