Average Ratings 408 Ratings
Average Ratings 6 Ratings
Description
ADAudit Plus enhances the security and compliance of your Windows Server environment by delivering comprehensive insights into all operational activities. It offers a detailed overview of modifications made to Active Directory (AD) resources, encompassing AD objects and their respective attributes, group policies, and more. By conducting thorough AD audits, organizations can identify and mitigate insider threats, misuse of privileges, and other signs of potential security breaches, thereby bolstering their overall security framework. The tool enables users to monitor intricate details within AD, including entities such as users, computers, groups, organizational units (OUs), group policy objects (GPOs), schemas, and sites, along with their associated attributes. Furthermore, it tracks user management activities like the creation, deletion, password resets, and alterations in permissions, providing insights into the actions taken, the responsible individuals, the timing, and the originating locations. Additionally, it allows organizations to monitor the addition or removal of users from security and distribution groups, ensuring that access privileges are kept to the necessary minimum, which is critical for maintaining a secure environment. This level of oversight is vital for proactive security management and compliance adherence.
Description
As a global IaaS solutions provider, phoenixNAP helps organizations of different sizes meet their IT performance, security, and scalability needs. Delivered from strategic edge locations in the U.S., Europe, Asia-Pacific, and Latin America, phoenixNAP's solutions are globally available, enabling businesses reach their target locales. Its colocation, HaaS, private and hybrid cloud, backup, disaster recovery, and security services are available on an opex-friendly model, providing flexibility and cost-efficiency. Based on world-class technologies, they provide redundancy, security, and advanced connectivity. Companies of all verticals and sizes can leverage phoenixNAP infrastructure for their evolving IT requirements at any stage of growth.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon Web Services (AWS)
Ansible
Arista EOS
Azure Marketplace
Chef
ExtremeCloud IQ
Microsoft 365
Microsoft Entra ID
NVIDIA DRIVE
Integrations
Active Directory
Amazon Web Services (AWS)
Ansible
Arista EOS
Azure Marketplace
Chef
ExtremeCloud IQ
Microsoft 365
Microsoft Entra ID
NVIDIA DRIVE
Pricing Details
$595.00/year
Free Trial
Free Version
Pricing Details
$0.10/hour
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Zoho
Founded
1996
Country
India
Website
www.manageengine.com/products/active-directory-audit/active-directory-auditing-solutions.html
Vendor Details
Company Name
phoenixNAP
Founded
2009
Country
United States
Website
phoenixnap.com
Product Features
Audit
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
Product Features
Backup
Backup Log
Backup Scheduling
Cloud Backup
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Remote Server Options
Secure Data Storage
Web Access / Restoration
Business Continuity
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cloud Storage
Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control
Data Center Backup
Continuous Data Protection
Deduplication
Encryption
File Archival
File Compression
Platform Agnostic
Regular Snapshots
Reporting / Analytics
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)
Dedicated Server Hosting
24/7 On-site Support
Built-in Backup Drives
DDOS Protection
IMPI Access
Off Server Backups
Root Level
SSD Storage
Uptime SLA
Disaster Recovery
Administration Policies
Bare-Metal Recovery
Encryption
Failover Testing
Flexible Data Capture
Multi-Platform Support
Multiple Data Type Support
Offline Storage
Infrastructure-as-a-Service (IaaS)
Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring