Documentation & Reporting

You are here


Logbook Activities over the course of time

The Logbook documents the identities of everyone who has used 8MAN for activities in Active Directory, the file servers, SharePoint and Exchange and when they did so. You can use the Calendar function to view the activities over the course of time.

Our security monitoring (8MATE Logga and FS Logga) records everything -- even changes made outside 8MAN. This allows you to close a potentially critical security gap. Authorizations issued for a short time for access to confidential data are immediately detected.

The mandatory comment function takes the burden off the administrator. Since a short note (a ticket number for instance) is stored, every activity is traceable, even a long time after.




Report Who has access and where?

In 8MAN you can create reports that really get used. Your auditor will be astonished to see all the access rights of an employee on one page. Management is relieved if it knows who has access to the personnel data folder. The reports can be configured with just a few clicks, are understandable by everyone and can be transmitted automatically.

A report is created in three simple steps: Define the resources to be analyzed, select the output format and click Start.



About 8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments protecting companies against unauthorized access to sensitive data. The 8MAN core functions include: Permission Analysis, Security Monitoring, Documentation & Reporting, Role & Process Optimization and User Provisioning. The software solution - a product of Protected Networks - is developed in Germany. 



It redefines standards for professional network security and efficient user management and combines advanced functionalities with meeting current security and compliance regulations.