Average Ratings 432 Ratings
Average Ratings 0 Ratings
Description
ADAudit Plus enhances the security and compliance of your Windows Server environment by delivering comprehensive insights into all operational activities. It offers a detailed overview of modifications made to Active Directory (AD) resources, encompassing AD objects and their respective attributes, group policies, and more. By conducting thorough AD audits, organizations can identify and mitigate insider threats, misuse of privileges, and other signs of potential security breaches, thereby bolstering their overall security framework. The tool enables users to monitor intricate details within AD, including entities such as users, computers, groups, organizational units (OUs), group policy objects (GPOs), schemas, and sites, along with their associated attributes. Furthermore, it tracks user management activities like the creation, deletion, password resets, and alterations in permissions, providing insights into the actions taken, the responsible individuals, the timing, and the originating locations. Additionally, it allows organizations to monitor the addition or removal of users from security and distribution groups, ensuring that access privileges are kept to the necessary minimum, which is critical for maintaining a secure environment. This level of oversight is vital for proactive security management and compliance adherence.
Description
Keep a close watch on vital files, directories, and registry entries—particularly those that are not expected to change during standard operations—for any modifications that may pose a risk. Identify all installed software packages and set up automatic monitoring to report and alert any changes. The package monitoring feature utilizes policy templates for tailored reporting and notification of critical alterations. ALM FIM is capable of saving both the previous and updated contents of modified text files and registry keys, enabling users to pinpoint and evaluate the precise changes that have taken place, with the option to revert them if necessary. Additionally, ALM-FIM gathers and retains metadata regarding files, folders, and registry keys to facilitate its monitoring functions. This collected metadata encompasses various details, including checksums of the content, dimensions, permissions, timestamps of changes, links, and other pertinent information. By implementing such comprehensive monitoring, organizations can better safeguard their critical assets.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Azure Marketplace
Microsoft Entra ID
Pricing Details
$595.00/year
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Zoho
Founded
1996
Country
India
Website
www.manageengine.com/products/active-directory-audit/active-directory-auditing-solutions.html
Vendor Details
Company Name
Assuria
Founded
2005
Country
United Kingdom
Website
assuria.com/products/alm-siem-2
Product Features
Audit
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring