The Logbook documents the identities of everyone who has used 8MAN for activities in Active Directory, the file servers, SharePoint and Exchange and when they did so. You can use the Calendar function to view the activities over the course of time.
Our security monitoring (8MATE Logga and FS Logga) records everything -- even changes made outside 8MAN. This allows you to close a potentially critical security gap. Authorizations issued for a short time for access to confidential data are immediately detected.
The mandatory comment function takes the burden off the administrator. Since a short note (a ticket number for instance) is stored, every activity is traceable, even a long time after.
"The reports are painful at first. For the first time, they show you in black and white just how large the sites really are. On the other hand, we now have a guarantee of our security".
In 8MAN you can create reports that really get used. Your auditor will be astonished to see all the access rights of an employee on one page. Management is relieved if it knows who has access to the personnel data folder. The reports can be configured with just a few clicks, are understandable by everyone and can be transmitted automatically.
A report is created in three simple steps: Define the resources to be analyzed, select the output format and click Start.