BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Did you know? Create custom audit views and reports with PowerBroker Auditor for Active Directory

Posted July 31, 2013    Morgan Holm

Did you know about the create custom audit views and reports feature in the PowerBroker Auditor for Active Directory solution?  Even though there are already around 200 built-in audit views that ship with the product organizations need to be able to target specific information for their environment and the task that is at hand. Needless to say, so they don’t have time to wade through reams of result data to find the information they need.

What is it? – Operations management, security and compliance officers or internal and external auditors have a multitude of differing reporting needs that continually evolve.  PowerBroker Auditor for AD provides a simple and quick wizard-based approach to creating interactive audit views or reports of the collected audit information.

Audit views provide filtering that can be combined to show only relevant information based on any combination of the following criteria:

Who – Accounts making the changes

  • Can be filtered down to individual accounts
  • Exclusions can be set to show changes by anyone other than the desired accounts

What – Actions associated with objects / attributes

  • Create, modify, delete move and rename actions can be filtered individually or in any combination on one or more object types
  • Modifications can be set down to one or more attributes

Where – Locations in the environment

  • Scope to specific areas such as an OU or filter down to an individual object in the directory

When – Timeframe for view

  • Filter based on time criteria between desired dates and even exact times

Schedule – Output audit view to a report

  • For view information that is required on a regular basis automate the creation of reports in PDF or XML for Excel

Why is it important?

  • Automate the creation of reports that only contain the desired information
  • Simple and efficient to use

A straight forward wizard based process makes it easy to target the views and reports. See below.

New-Audit-Review-screenshot

Interested in learning more? Schedule a demo of PowerBroker Auditor for Active Directory today!

Tags:
, , , , , , , , , , , ,

Leave a Reply

Additional articles

dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,
bank theft img

The Vulnerabilities and Privileges of Carbanak Bank Thieves

Posted February 17, 2015    BeyondTrust Research Team

Recently Kaspersky released analysis of a series of significant breaches against financial institutions by a group they have dubbed Carbanak. The attacks go back over 2 years and estimates are that potentially $1 billion dollars in total were stolen from more than 100 financial institutions. In some cases the attackers were active in victim organizations between…

Tags:
, , ,