• chorus.adm
  • 0 Comment
  • No tags

Unauthorized and accidental changes in Active Directory, Group Policy, file servers, Exchange, SQL Server, virtual environments and other IT infrastructure changes can have a negative impact on business continuity and predictability. If users suddenly can’t access the needed resources and get needed information, then your business simply can’t perform.

Your ability to ensure business continuity depends entirely on whether you can quickly detect and revert inappropriate or unauthorized changes. Trying to accomplish this task manually can take enormous resources and still never paint the whole picture of exactly what happened.

Unlike traditional log-based auditing and monitoring solutions (such as SIEM), Netwrix makes it very easy to find relevant answers to key questions:

  • What specifically was changed?
  • Who did it?
  • When was the change made?
  • Where was the change made?

Netwrix Auditor can give you answers to all those critical questions, providing you with the previous and new values for each modified setting. You will always have answers to such questions, as:

  • Who deleted an organizational unit in Active Directory?
  • Who deactivated strong password policy?
  • What changes occurred to virtual machine configuration?
  • Who accessed sensitive files or file servers?
  • What servers were removed from a SharePoint farm?

and all other types of important modifications.

Leave a comment

You must be logged in to post a comment.