转自http://www.quest.com/intrust-for-active-directory/
InTrust Plug-in for Active Directory allows organizations to track, store, alert, and report on domain controller activity and the details of changes made to Active Directory and Group Policy.
InTrust Plug-in for Active Directory provides comprehensive, detailed, real-time auditing of all changes to ADAD and Group Policy Objects (GPOGPOs), including changes to ADAD configuration, mailbox permissions and GPOGPO settings. InTrust Plug-in for Active Directory provides all the information behind important changes, including who made the change, where they made the change from - and the before and after values. Operationally, administrators can troubleshoot ADAD problems and reverse any changes if necessary, or for the most sensative areas can have this done automatically through action-enabled alerts. By allowing administrators to track changes to ADAD security and policy and show how the changes have strayed from the approved configuration, organizations can address ITIT compliance requirements.
In addition to tracking all changes to ADAD and GPOGPOs, InTrust Plug-in for Active Directory provides protection against changes to the most critical ADAD objects, such as organizational units (OUOUs) being accidentally deleted and GPOGPO settings being modified. InTrust Plug-in for Active Directory can immediately notify you of unwanted changes, take automatic action against undesired changes, and even prevent changes to the most vulnerable objects from occurring.
InTrust Plug-in for Active Directory audits all events on domain controllers, including unusual user and suspicious administrator activity, elevated privileges, and adherence to security best practices. By providing efficient collection and storage of audit data, InTrust Plug-in for Active Directory enables organizations to effectively react to policy violations, ensuring that established security best practices and internal policies are maintained.
The Quest Knowledge Portal provides a single, unified reporting platform for a variety of Quest products, including InTrust for Active Directory. The Portal facilitates scheduled and ad hoc reporting, enabling complete business views into IT at both a summary and a granular level. (more)
Through 2010, organizations that select individual solutions for regulatory challenges will spend 10 times more on the IT resources for them than companies that take a more proactive, integrated approach. Quest can show you how to reduce cost and complexity in your compliance initiatives. Visit Compliance Central or listen to one of our educational free Webcasts to find out more.
Exchange is first and foremost an e-mail server, and when e-mail servers were first designed, no one foresaw the massive dependence that would develop between organizations and their e-mail servers. Today 60% of organizations process revenue-generating orders via e-mail and approximately 75% of corporate intellectual property is being transmitted via e-mail.
Without accurate tracking of Exchange mailbox activity, organizations find it difficult to react to administrative and security-policy violations, which affect their ability to ensure compliance. Organizations can incur lost productivity and system downtime if faced with undetected, undesired changes to critical objects in Exchange. Without awareness of changes to critical objects, such as who made the change and the before and after values, organizations cannot efficiently address unwanted change.
In this case, the gap is filled with the InTrust Plug-in for Exchange. Register now for this live event.
It can be frustrating to depend on the native Windows security log features during a file access audit. Randy Franklin Smith, security expert and moderator of Ultimate Windows Security is joining with Quest Software for a webinar that will save you time during your next audit. You’ll learn the limitations of the security log, and how one tool can address them. This event occurred 17 April 2008. Listen Now.
Do you sometimes feel like you’re surprised by some of the questions from your auditor? Ever wish you could freeze time and have an extra week to get prepared for your audit? Listen to a recording of this no-cost, live Webex from a former IT Compliance Auditor as he covers security and auditing for the Windows Enterprise. This Webex occured April 3.
Find out the places auditors know to look for non-compliance, and how you can be ready to proactively handle these common pitfalls and turn them into wins. Free WhitePaper! In addition to participating in this live webinar with a question and answer session, a whitepaper will be available as well.
Listen to a Webcast of Randy Franklin Smith, information security expert from Monterey Technology Group, as he discusses how to take your PCI Compliance program to the next level by learning some of the secrets to simplifying and reduce the costs of your ongoing proof of compliance and annual certification. The webcast is entitled 8 Simple Ways to Simplify Your PCI Compliance.
Randy Franklin Smith also presented his WhitePaper in a live Webex where he discussed the main compliance regulations, identified common change management and monitoring elements, and pointed out important differences where they occur. If you missed that session, you can listen to a recording of that presentation here.
You may also Listen to a follow-up Webex that was a continuation of that topic where we focused on showing how Quest's award-winning software can deliver the systematic efficiency and audit-proof systems you need to help meet key IT Control components of the PCI DSS requirements.
Now learn how to leverage Quest's Best Practices Compliance Lifecycle to implement a holistic solution to your compliance initiatives. Listen to one of our Compliance presentations to find out how.