NetVision Company Blog

A Discussion on Effective Audit of User Access

Access Rights Inspector

Tags: , ,

NetVision is proud to introduce Access Rights Inspector.

Access Rights Inspector provides effective rights on Active Directory objects and Windows File System. It removes the complexity of rights assignments, nested group memberships, explicit rights granted directly to users, deny entries, and inherited permissions.

To get the basics, take a look at this 5 minute video presentation

Removing the Hoops

Tags: ,

Over at my other blog, I published a post titled:

If the UI fails, the application fails

I wanted to briefly describe what that means to us at NetVision and how we’ve incorporated that mantra into our design strategy.

When sorting through access audit information, many professionals feel like they have to jump through all sorts of hoops to get to the information they need.  First, find hardware to host a solution, install software, perform never-ending configuration, maintain the environment, figure out how to collect the information, sift through mountains of log data, get training on what information is relevant, maintain proper training on the hardware, software, audit data, and requirements, and more.  If all of that is required just to get a report on access rights, it’s no wonder so many people fail at adequately answering the question.  (And 50% of IT execs say they can not adequately answer the question of Who Has Access to What.)

NetVision removes the hoops.  We know that if you have to move mountains to reach your goal, you’ll be less likely to succeed.  And if you do succeed, it’ll be at great expense and effort.  So, we make it easy.

First, we provide an appliance that is engineered and optimized for a single purpose.  We install all software and do all the configuration.  We setup policies and reports based on your organization’s needs.  All that’s left is for you to open the reports and get to the information you need.  No hoops. 

And the really amazing part is that having us do it actually costs less than doing it yourself.

Exchange Mailbox Monitoring

Tags: ,

We already told you that updates for SIMON would be provided on a regular basis.  The latest enables Microsoft Exchange Monitoring without any further customization.  You asked for it and we listened.

A few of the commonly requested reports include:

  • Logon to Mailbox - tells you when users access their Exchange mailboxes.  This could be important as an audit trail.
  • Failed Attempt to Access a Mailbox - tells you when someone attempts to access a mailbox for which they don’t have permission.  This could indicate an attack scenario or perhaps let you know when employees need access to a shared mailbox account.
  • Logon to Non-Primary Mailbox - tells you when someone accesses a mailbox for which they are not the primary owner.  This enables you to monitor privileged users who may have permissions to access mailboxes that they shouldn’t be viewing.  It’s also good for audit trail purposes.

If Exchange Mailbox monitoring is important to you, be sure to let us know and we’ll make it a part of your personalized product demonstration.

© 2009 NetVision Company Blog. All Rights Reserved.

This blog is powered by Wordpress and Magatheme by Bryan Helmig.