8MATE AD Logga

You are here

Problem

Various employees can carry out changes to Active Directory. Not having comprehensive monitoring results in security risks and inconsistencies in the processes of making changes.
 
Security risks 

Security risks arise when temporary group memberships provide unauthorised employees with access to confidential documents. Even if the group memberships are subsequently removed, any incidents could remain undetected.  

Unclear processes

Unclear processes can only be improved if the current processes can be analysed. Who gives whom memberships and resets passwords? Where and how do problems arise? The analysis of errors allows for creation of an individual group authorisation concept. 

 

 


 

Solution

8MAN provides clarity concerning the permission situation in the Active Directory. The AD Logga extends this transparency to the entire change history in the system. Thereby, activities performed outside of 8MAN are also recorded. Additionally, security-related temporary group memberships and the resulting uncontrolled (unmonitored) assignment of permissions are immediately visible.

Comprehensive detection of activities with regard to accounts, objects, groups and attributes is enabled by means of configurable reports. 

  • Administrators obtain a complete picture of activities in the AD. This allows for optimising any processes or policies that are found lacking.  
  • Auditors are able to identify security incidents and the players involved. This allows authorized users to take appropriate actions. 
  • This gives the management reassurances that no problems will re-occur. With its monitoring, the AD Logga provides the data for internal security and process enhancements

 

 

About 8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process Optimization and User Provisioning. The software solution - a product of Protected Networks - is developed in Germany. 

 

 

It redefines standards for professional network security and efficient user management and combines advanced functionalities with meeting current security and compliance regulations.

Service

Contact