50 likes | 192 Views
Identity Audit solutions for reporting and monitoring of identity controls, user behavior and the power given to users. Identity Audit. [ ]. Policing the Power of Identity. Controls. Security Mechanisms that grant or deny access. Behavior.
E N D
Identity Audit solutions for reporting and monitoring of identity controls, user behavior and the power given to users Identity Audit [ ] Policing the Power of Identity Controls Security Mechanisms that grant or deny access Behavior What Users are actually doing Power Verify that controls are in place and functioning What rights have been given to users: Potential Risk Monitor user behavior and verify that people are acting in accordance with policies Report on user accounts, status and group memberships to see what users are empowered to do on the network
Capabilities Controls Microsoft Windows - Active Directory Group Memberships - File System permissions - Active Directory GPOs - Monitor for accounts created outside of provisioning process or other controls Novell NDS and eDirectory - File System explicit or effective rights - eDirectory LDAP ACLs - eDirectory User Templates - Universal Password Snapin - Prevent specific file types * Specific platforms and versions should be verified for exact functionality
Capabilities Behavior Microsoft Windows - Active Directory account creations or group membership changes - File System file or folder access creates, mods, deletes - Changes to file system permissions - Changes to GPO policies - Authentication Attempts & failed logon attempts Novell NDS and eDirectory - Monitor account or group creates, mods, deletes - Monitor eDirectory object ACL changes - File System file or folder access, creates, mods, deletes(including specific file types) - Authentication Attempts * Specific platforms and versions should be verified for exact functionality
Capabilities Power Microsoft Windows - Active Directory group memberships - File System file or folder explicit rights - Search for dormant accounts & disable per policy - Any object and attribute combination (power based on user attributes) Novell NDS and eDirectory - Monitor account creations - File System file or folder explicit and effective rights - Any object and attribute combination (power based on user attributes) - Security Equivalence Reports * Specific platforms and versions should be verified for exact functionality
Policing the Power of Identity Since 1995 ...with over 600 customers in 20 countries www.NetVision.com