Learn More
Learn More

Average Ratings 408 Ratings

Average Ratings 6 Ratings

Description

ADAudit Plus enhances the security and compliance of your Windows Server environment by delivering comprehensive insights into all operational activities. It offers a detailed overview of modifications made to Active Directory (AD) resources, encompassing AD objects and their respective attributes, group policies, and more. By conducting thorough AD audits, organizations can identify and mitigate insider threats, misuse of privileges, and other signs of potential security breaches, thereby bolstering their overall security framework. The tool enables users to monitor intricate details within AD, including entities such as users, computers, groups, organizational units (OUs), group policy objects (GPOs), schemas, and sites, along with their associated attributes. Furthermore, it tracks user management activities like the creation, deletion, password resets, and alterations in permissions, providing insights into the actions taken, the responsible individuals, the timing, and the originating locations. Additionally, it allows organizations to monitor the addition or removal of users from security and distribution groups, ensuring that access privileges are kept to the necessary minimum, which is critical for maintaining a secure environment. This level of oversight is vital for proactive security management and compliance adherence.

Description

As a global IaaS solutions provider, phoenixNAP helps organizations of different sizes meet their IT performance, security, and scalability needs. Delivered from strategic edge locations in the U.S., Europe, Asia-Pacific, and Latin America, phoenixNAP's solutions are globally available, enabling businesses reach their target locales. Its colocation, HaaS, private and hybrid cloud, backup, disaster recovery, and security services are available on an opex-friendly model, providing flexibility and cost-efficiency. Based on world-class technologies, they provide redundancy, security, and advanced connectivity. Companies of all verticals and sizes can leverage phoenixNAP infrastructure for their evolving IT requirements at any stage of growth.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Amazon Web Services (AWS)
Ansible
Arista EOS
Azure Marketplace
Chef
ExtremeCloud IQ
Microsoft 365
Microsoft Entra ID
NVIDIA DRIVE
Plesk
Pulumi
Terraform
VMware Cloud
Zerto
cPanel

Integrations

Active Directory
Amazon Web Services (AWS)
Ansible
Arista EOS
Azure Marketplace
Chef
ExtremeCloud IQ
Microsoft 365
Microsoft Entra ID
NVIDIA DRIVE
Plesk
Pulumi
Terraform
VMware Cloud
Zerto
cPanel

Pricing Details

$595.00/year
Free Trial
Free Version

Pricing Details

$0.10/hour
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Zoho

Founded

1996

Country

India

Website

www.manageengine.com/products/active-directory-audit/active-directory-auditing-solutions.html

Vendor Details

Company Name

phoenixNAP

Founded

2009

Country

United States

Website

phoenixnap.com

Product Features

Audit

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Product Features

Backup

Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration

Business Continuity

Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Data Center Backup

Continuous Data Protection
Deduplication
Encryption
File Archival
File Compression
Platform Agnostic
Regular Snapshots
Reporting / Analytics

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Dedicated Server Hosting

24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA

Disaster Recovery

Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage

Infrastructure-as-a-Service (IaaS)

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

PCI Compliance

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Alternatives

CPTRAX for Windows Reviews

CPTRAX for Windows

Visual Click Software

Alternatives

VSYS Reviews

VSYS

VSYS Host