In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.
Monitor user logon activity in real-time on Domain Controllers with pre-configured audit reports and email alerts. Audit reports ensure the administrator knows the reason behind users’ logon failures, login history, terminal services activity, and users’ recent logon activities across the Windows server network.
SMBs or large organisations have to comply with industry specific Compliance Acts like SOX, HIPAA, GLBA, PCI-DSS, FISMA…. With our Compliance specific pre-configured reports and real-time alerts, we ensure your Windows network is under 24/7 audit with periodic security reports and email alerts as standard procedure.
Reports & Alerts
Choose from the 200+ schedulable pre-configured audit reports; create custom reports, set profile based reports and report from archived data for forensics. In real-time, track Windows AD object changes (Users, OU, Groups, GPO, Computer, Schema, DNS and System) and get email alerts on unauthorized network access / modification events.
In real-time, audit the before and after attribute values of Windows AD Objects; Know every change to User, Computer, Groups, GPO and OU and be up-to-date on unauthorized attempts and get alerts for every attribute modification / permission changes. View the corresponding pre-configured reports in a single screen.
Run periodic archiving of audited events data to save on disk space. View reports from past events like Active Directory user logon history, password change history and more from the Active Directory archived audit data for computer forensics or compliance. The audited reports can be exported to xls, csv, pdf and excel formats.
Audit and Report on the GPO changes to the Windows Active Directory and Windows Servers; In-depth advanced tracking of the Group Policy Objects new and old values, configuration, password policy and settings changes and meet regulatory IT network security and various Compliance requirements.