SlideShare a Scribd company logo
1 of 32
Compliance
Quest Compliance Suite for Exchange for File Access for SharePoint * ,[object Object]
Visibility to an expected operational policy (user provisioning process)
Visibility of end user access (permissions)
Forensic analysis to determine who, what, when and how the deviation occurred from the assess phase
Notify of any changes to the expected state
Preventative controls to address the deviation from ever occurring in the first place
Address issue immediately
Document that the deviation is an exception and therefore authorized,[object Object]
Introducing ActiveRoles Server Practical Provisioning, Management, and Security for Active Directory, AD LDS and Beyond ActiveRoles Server offers a practical approach to automated Active Directoryuser provisioning and administration, for maximum security and efficiency
Key Features Provisioning End-to-End User and Group Lifecycle Management Automatic User and Group Provisioning and Deprovisioning Management Unified Active Directory and Active Directory Lightweight Directory Services (AD LDS – formerly ADAM) Management Automated group management Interfaces for Day-to-Day administrators, Help Desk, and end user self-service ADSI and PowerShell support for extensibility  Security Controlled Administration through Roles and Rules for a true least privilege model  Approval Workflow for Change Control Centralized Auditing & Reporting Add-on Applications Quickly and easily connect to existing HR/ERP system or ILM 2007 (MIIS) to provision and synchronize Active Directory Simplified Exchange Resource Forest Management – from a single console Protection for critical DNS Services Compliant & Secure Access Management through Group Membership Self-Service
ActiveRoles Server Provisioning
Identity Lifecycle Management ,[object Object]
Accounts in Connected Systems Created
E-mail notificationsNew User is Provisioned (Hire) ,[object Object]
Mailbox and Home Folders Creation
Group and Distribution List MembershipsIdentity Administration ,[object Object]
Group and Distribution List Membership Changes
Self-serviceDeprovision (Retire) ,[object Object]
Disable Accounts
Disable Access to Resources
Assign Entitlements to othersReprovisioning (Promotion) ,[object Object]
Project Assignments
Information updates,[object Object]
ActiveRoles Server Management
Efficient Group Management Efficiency Extensive Group Management functionality saves Time, makes administrators more efficient, reduces errors and accuracy ensured by application of consistent policies Improves Administrator efficiency while reducing mistakes and security concerns. Exclude criteria provides separation of duties capability Group Membership Rules Automatically add users to groups based on a common set of policy rules. Dynamic Groups and Group Families Automatically add or remove users to groups according to a set of query based criteria - Bulk creation and population of groups
Web Based Day-to-Day Adminand Help Desk Web Consoles Simplifies day-to-day tasks and reduces administrative costs Provides alternate console for managing Active Directory Configurable with Point-and-click simplicity to meet customer needs Complete management of user, group, computer, and Microsoft Exchange Built with the latest ASP.NET technology
Empower UsersThrough Self-Service ,[object Object],Decreases help desk calls and IT time  Exchange GAL more accurate (info updated more easily/often) Allow employees to determine what personal info is published  ,[object Object],[object Object]
ARS Mgmt Shell for AD ,[object Object],New command line interface from Microsoft More “Unix” like usage The foundation of Exchange 2007 ,[object Object],Provides a command line for ActiveRoles Server Simplifies bulk operations Commands work with or without ActiveRoles Server, but maximum benefit only comes with ActiveRoles ownership ActiveRoles (at Microsoft’s request) is the first and only product to provide PowerShell commands for Active Directory Commands are subject to Rules, Roles and Approvals Microsoft PowerShell
Controlled Administrationwith Roles and Rules Provides administrative layer between users and Active Directory, for strict enforcement of operating policies and to eliminate unregulated access - Enforces “Least Privilege” Model Allows for centralized auditing and reporting of directory-related changes Simplifies the process of delegating rights by abstracting the required delegation into roles (or templates) that can be quickly deployed and easily maintained  Controls the administrative rights that individual accounts and groups get in Active Directory through role-based delegation Provides full reporting and import/export capabilities Provides multi-forest support
Roles Based Delegation Sr. Administrator Exchange Admins OU Admins / Help Desk Application / Data Owners End user Self-Service Day-to-Day Admin Active Directory Full Control Computers Domain Controllers AD Architect Mailbox Admin Create Mailbox, Move Mailbox APAC EMEA North America Service Desk New York Create Users/Groups Create Groups Reset Passwords, Unlock Accounts Mexico City Self-Service AD LDS Update personal Information Request Changes ADAM Objects App/Data Owners DNS Servers Change Group Membership DNS Records Job Function Roles  Access
Prevent Un-wanted Changewith Approval Workflow Management Solution Remediation - Deprovision Groups Applicationor Data Owner ApprovalWorkflow +   - Manage GroupMembership Or Review Owner Attestation Review Assistants IT Oversight VerificationReports IT Administrator Provides segregation of duties and tracking of request and responses to help with security and compliance

More Related Content

What's hot

SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides
WSO2
 
Exchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanExchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP Padman
Quek Lilian
 
Malta soa infrastructure
Malta soa infrastructureMalta soa infrastructure
Malta soa infrastructure
Angel Knight
 
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraWindows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Quek Lilian
 

What's hot (20)

Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Event Driven Architecture
Event Driven ArchitectureEvent Driven Architecture
Event Driven Architecture
 
SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides
 
BCC solutions for IBM Notes & Domino Infrastructure & Administration
BCC solutions for IBM Notes & Domino Infrastructure & AdministrationBCC solutions for IBM Notes & Domino Infrastructure & Administration
BCC solutions for IBM Notes & Domino Infrastructure & Administration
 
Exchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanExchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP Padman
 
Malta soa infrastructure
Malta soa infrastructureMalta soa infrastructure
Malta soa infrastructure
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
 
DMS SOLUTION - 1
DMS SOLUTION - 1DMS SOLUTION - 1
DMS SOLUTION - 1
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5
 
Dependency Visualization with WSO2 Governance Registry 5.2
Dependency Visualization with WSO2 Governance Registry 5.2Dependency Visualization with WSO2 Governance Registry 5.2
Dependency Visualization with WSO2 Governance Registry 5.2
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraWindows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
 
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley ComplianceReducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
 
CadmiuCD Integrations
CadmiuCD IntegrationsCadmiuCD Integrations
CadmiuCD Integrations
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on Azure
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Laserfiche cloud factsheet
Laserfiche cloud factsheetLaserfiche cloud factsheet
Laserfiche cloud factsheet
 

Viewers also liked

Gerenciamento de identidades e acesso gia
Gerenciamento de identidades e acesso   giaGerenciamento de identidades e acesso   gia
Gerenciamento de identidades e acesso gia
Alfredo Santos
 

Viewers also liked (12)

Entendendo o SELinux - Security Enhanced Linux
Entendendo o SELinux - Security Enhanced LinuxEntendendo o SELinux - Security Enhanced Linux
Entendendo o SELinux - Security Enhanced Linux
 
Asterisk
AsteriskAsterisk
Asterisk
 
Gerenciamento de identidades e acesso gia
Gerenciamento de identidades e acesso   giaGerenciamento de identidades e acesso   gia
Gerenciamento de identidades e acesso gia
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Guia do Sysadmin das Galáxias
Guia do Sysadmin das GaláxiasGuia do Sysadmin das Galáxias
Guia do Sysadmin das Galáxias
 
Solução Gestão de Acesso e Segurança
Solução Gestão de Acesso e SegurançaSolução Gestão de Acesso e Segurança
Solução Gestão de Acesso e Segurança
 
Gerência de Redes - 5.SNMPv3
Gerência de Redes - 5.SNMPv3Gerência de Redes - 5.SNMPv3
Gerência de Redes - 5.SNMPv3
 
Gustavo Mota - CEO We do Logos
Gustavo Mota - CEO We do LogosGustavo Mota - CEO We do Logos
Gustavo Mota - CEO We do Logos
 
IDM - Gereciamento de Identidades Corporativa
IDM - Gereciamento de Identidades CorporativaIDM - Gereciamento de Identidades Corporativa
IDM - Gereciamento de Identidades Corporativa
 
Auditoria em tecnologia da informação
Auditoria em tecnologia da informaçãoAuditoria em tecnologia da informação
Auditoria em tecnologia da informação
 
Controle de acesso físico e lògico
Controle de acesso físico e lògicoControle de acesso físico e lògico
Controle de acesso físico e lògico
 
Redes de Computadores - Modelo de Referência OSI/ISO
Redes de Computadores - Modelo de Referência OSI/ISORedes de Computadores - Modelo de Referência OSI/ISO
Redes de Computadores - Modelo de Referência OSI/ISO
 

Similar to Compliance

SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
OlivierMichot
 
Free help desk evaluation checklist
Free help desk evaluation checklistFree help desk evaluation checklist
Free help desk evaluation checklist
IITSW Company
 
Key features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheetKey features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheet
IITSW Company
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Boni Yeamin
 
Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1
Erin
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102
Cana Ko
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
Mizuhashi Yuki
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
Amit Gatenyo
 

Similar to Compliance (20)

200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
iTEAM_Microsoft 2008 {heroes happen here} Event Presentation
iTEAM_Microsoft 2008 {heroes happen here} Event PresentationiTEAM_Microsoft 2008 {heroes happen here} Event Presentation
iTEAM_Microsoft 2008 {heroes happen here} Event Presentation
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 
Free help desk evaluation checklist
Free help desk evaluation checklistFree help desk evaluation checklist
Free help desk evaluation checklist
 
Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User Management
 
sdonellan2016
sdonellan2016sdonellan2016
sdonellan2016
 
Key features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheetKey features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheet
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
 
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementPhase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1
 
Presentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptxPresentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptx
 
User Manager
User ManagerUser Manager
User Manager
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
 
Ikenstudiolive
IkenstudioliveIkenstudiolive
Ikenstudiolive
 
The Top 7 Active Directory Admin Challenges Overcome White Paper
The Top 7 Active Directory Admin Challenges Overcome White PaperThe Top 7 Active Directory Admin Challenges Overcome White Paper
The Top 7 Active Directory Admin Challenges Overcome White Paper
 

More from NetBR

More from NetBR (6)

Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Lieb Soft
Lieb SoftLieb Soft
Lieb Soft
 
Santo Digital
Santo DigitalSanto Digital
Santo Digital
 
Delegation
DelegationDelegation
Delegation
 
System Man
System ManSystem Man
System Man
 
Virtualization Consolidation Slide
Virtualization Consolidation SlideVirtualization Consolidation Slide
Virtualization Consolidation Slide
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Compliance

  • 2.
  • 3. Visibility to an expected operational policy (user provisioning process)
  • 4. Visibility of end user access (permissions)
  • 5. Forensic analysis to determine who, what, when and how the deviation occurred from the assess phase
  • 6. Notify of any changes to the expected state
  • 7. Preventative controls to address the deviation from ever occurring in the first place
  • 9.
  • 10. Introducing ActiveRoles Server Practical Provisioning, Management, and Security for Active Directory, AD LDS and Beyond ActiveRoles Server offers a practical approach to automated Active Directoryuser provisioning and administration, for maximum security and efficiency
  • 11. Key Features Provisioning End-to-End User and Group Lifecycle Management Automatic User and Group Provisioning and Deprovisioning Management Unified Active Directory and Active Directory Lightweight Directory Services (AD LDS – formerly ADAM) Management Automated group management Interfaces for Day-to-Day administrators, Help Desk, and end user self-service ADSI and PowerShell support for extensibility Security Controlled Administration through Roles and Rules for a true least privilege model Approval Workflow for Change Control Centralized Auditing & Reporting Add-on Applications Quickly and easily connect to existing HR/ERP system or ILM 2007 (MIIS) to provision and synchronize Active Directory Simplified Exchange Resource Forest Management – from a single console Protection for critical DNS Services Compliant & Secure Access Management through Group Membership Self-Service
  • 13.
  • 14. Accounts in Connected Systems Created
  • 15.
  • 16. Mailbox and Home Folders Creation
  • 17.
  • 18. Group and Distribution List Membership Changes
  • 19.
  • 21. Disable Access to Resources
  • 22.
  • 24.
  • 26. Efficient Group Management Efficiency Extensive Group Management functionality saves Time, makes administrators more efficient, reduces errors and accuracy ensured by application of consistent policies Improves Administrator efficiency while reducing mistakes and security concerns. Exclude criteria provides separation of duties capability Group Membership Rules Automatically add users to groups based on a common set of policy rules. Dynamic Groups and Group Families Automatically add or remove users to groups according to a set of query based criteria - Bulk creation and population of groups
  • 27. Web Based Day-to-Day Adminand Help Desk Web Consoles Simplifies day-to-day tasks and reduces administrative costs Provides alternate console for managing Active Directory Configurable with Point-and-click simplicity to meet customer needs Complete management of user, group, computer, and Microsoft Exchange Built with the latest ASP.NET technology
  • 28.
  • 29.
  • 30. Controlled Administrationwith Roles and Rules Provides administrative layer between users and Active Directory, for strict enforcement of operating policies and to eliminate unregulated access - Enforces “Least Privilege” Model Allows for centralized auditing and reporting of directory-related changes Simplifies the process of delegating rights by abstracting the required delegation into roles (or templates) that can be quickly deployed and easily maintained Controls the administrative rights that individual accounts and groups get in Active Directory through role-based delegation Provides full reporting and import/export capabilities Provides multi-forest support
  • 31. Roles Based Delegation Sr. Administrator Exchange Admins OU Admins / Help Desk Application / Data Owners End user Self-Service Day-to-Day Admin Active Directory Full Control Computers Domain Controllers AD Architect Mailbox Admin Create Mailbox, Move Mailbox APAC EMEA North America Service Desk New York Create Users/Groups Create Groups Reset Passwords, Unlock Accounts Mexico City Self-Service AD LDS Update personal Information Request Changes ADAM Objects App/Data Owners DNS Servers Change Group Membership DNS Records Job Function Roles Access
  • 32. Prevent Un-wanted Changewith Approval Workflow Management Solution Remediation - Deprovision Groups Applicationor Data Owner ApprovalWorkflow + - Manage GroupMembership Or Review Owner Attestation Review Assistants IT Oversight VerificationReports IT Administrator Provides segregation of duties and tracking of request and responses to help with security and compliance
  • 33. Centralized Reportingand Change History Operations Tracking On-line Administrator Activity Tracking Compliance Checking
  • 34. QuestIntrust SIEM & AD , File and Exchange Protection
  • 35. What if you could… Obtain real-time, detailed tracking of all changes to Active Directory (AD) and Group Policy settings? Take corrective actions for undesired changes in AD and ADAM, eliminating downtime and security breaches caused by accidental deletions or modifications? Be notified in real-time when critical events and changes are detected in AD, ensuring your awareness of possible security violations and destructive changes? Ensure adherence to compliance regulations and internal policies by tracking all activity in your Active Directory environment? Protect Active Directory by preventing changes to the most critical Active Directory objects, down to the attribute level including Group Policy Object settings?
  • 36.
  • 40.
  • 41.
  • 42.
  • 43. Sample reports with drill-down functionality which enablesyou to find exactly what you are looking for All file access activity performed by that user All recently deleted files and by user
  • 44. More sample reports… Drill down information from file highlighted in red showing all modification to that file and by whom
  • 46. What if you could… Audit administrative rights on your domains, workstations and servers? Ensure that privileges that are granted are in conformance with your formal security policies? Provide configuration reports quickly with the most current information? Have the capability to take action on violations to security policies? Know what changes have taken place to objects in the directory? Satisfy the needs of different data consumers in your organization?
  • 50.
  • 51. Visibility to an expected operational policy (user provisioning process)
  • 52. Visibility of end user access (permissions)
  • 53. Forensic analysis to determine who, what, when and how the deviation occurred from the assess phase
  • 54. Notify of any changes to the expected state
  • 55. Preventative controls to address the deviation from ever occurring in the first place
  • 57. Document that the deviation is an exception and therefore authorized