Active Directory, Group Policy, Servers, File Shares, Endpoints, USB Flash Drives
Audit Scans
Membership to Domain/Enterprise Admins Groups
Nested Groups
Groups with no members
All Groups and Group Members
Users not logged in the past 90 days
Users never logged in
User accounts expiring in 90 days
Expired user accounts
Accounts that never expire
Locked out accounts
Nested Groups
Groups with no members
All Groups and Group Members
Users not logged in the past 90 days
Users never logged in
User accounts expiring in 90 days
Expired user accounts
Accounts that never expire
Locked out accounts
Security Permissions on OUs
Security Permissions on Groups
Security Permission on Users
Security Permission on Folders
Security Permission on Files
Security Permissions on Containers
Disabled Users
User Settings
Users with no email addresses
Users with no managers
Users with managers
Security Permissions on Groups
Security Permission on Users
Security Permission on Folders
Security Permission on Files
Security Permissions on Containers
Disabled Users
User Settings
Users with no email addresses
Users with no managers
Users with managers
User passwords expiring in 30 days
Users who cannot change their password
Users with expired passwords
Users with passwords that never expire
Users who do not require passwords
OU Summary
OUs with linked GPOs
Empty OUs
Users who cannot change their password
Users with expired passwords
Users with passwords that never expire
Users who do not require passwords
OU Summary
OUs with linked GPOs
Empty OUs
Audit Trails
User Accounts Created Report
User Accounts Deleted Report
User Accounts Modified Report
User Accounts Enabled/Disabled Report
User Accounts Change Password Report
User Accounts Set Password Report
Add Member to Group
Remove Member from Group
Add Member to Universal Security Group
Remove Member from Universal Security Group
Create Object
Delete Object
Modified Object
Modify Security DACL
Account Locked Out
Account Unlocked
Enable Account
Disable Account
Set Password
Change Password
Trusted Domain Added
Audit Policy Change
Object Security Modification Report
New Domain Controller Added Report
Domain Controller Deleted Report
Enterprise Admin Added Report
Computer Added To Domain Report
Guest Account Enabled Report
Domain Admin Added Report
User Accounts Deleted Report
User Accounts Modified Report
User Accounts Enabled/Disabled Report
User Accounts Change Password Report
User Accounts Set Password Report
Add Member to Group
Remove Member from Group
Add Member to Universal Security Group
Remove Member from Universal Security Group
Create Object
Delete Object
Modified Object
Modify Security DACL
Account Locked Out
Account Unlocked
Enable Account
Disable Account
Set Password
Change Password
Trusted Domain Added
Audit Policy Change
Object Security Modification Report
New Domain Controller Added Report
Domain Controller Deleted Report
Enterprise Admin Added Report
Computer Added To Domain Report
Guest Account Enabled Report
Domain Admin Added Report
Password Policy Changes Report
Account Lockout Policy Changes Report
Audit Policy Changes Report
User Rights Assignment Changes Report
Restricted Groups Changes Report
File System Changes Report
Group Policies Added/Removed
Kerberos Policy Changes Report
GPO Links Created Report
GPO Links Deleted Report
GPO Linked Modified Report
GPO Delegations Added Report
GPO Delegations Modified Report
GPO Delegations Removed Report
GPO Security Filtering Changes Report
GPO WMI Filtering Modified Report
Security Options Changes Report
Event Log Settings Change Report
System Service Change Report
Registry Changes Report
Machine Administrative Templates Change Report
User Administrative Templates Change Report
Machine Software Installation Changes Report
Machine Script Changes Report
User Software Installation Changes Report
User Script Changes Report
Account Lockout Policy Changes Report
Audit Policy Changes Report
User Rights Assignment Changes Report
Restricted Groups Changes Report
File System Changes Report
Group Policies Added/Removed
Kerberos Policy Changes Report
GPO Links Created Report
GPO Links Deleted Report
GPO Linked Modified Report
GPO Delegations Added Report
GPO Delegations Modified Report
GPO Delegations Removed Report
GPO Security Filtering Changes Report
GPO WMI Filtering Modified Report
Security Options Changes Report
Event Log Settings Change Report
System Service Change Report
Registry Changes Report
Machine Administrative Templates Change Report
User Administrative Templates Change Report
Machine Software Installation Changes Report
Machine Script Changes Report
User Software Installation Changes Report
User Script Changes Report
Interactive Logon Report
Machine Unlock Report
Network Logon Report
Remote Interactive Logon Report
Service Logon Report
Kerberos Authentication Report
NTLM Authentication Report
Failed Logon Report
Failed Kerberos Authentication Report
Failed NTLM Authentication Report
Files Access Report
Files Created Report
Files Deleted Report
Files Modified/Written To Report
Files Renamed Report
Folders Accessed Report
Folders Created Report
Folders Deleted Report
Folders Renamed Report
File And Folder Attributes Change Report
Modify Files Security Report
Failed File And Folder Access Report
Security Event Log Cleared Report
System Time Changed Report
Applications Loaded/Executed Report
Applications Unloaded/Terminated Report
USB Inserted
USB Removed
File Created
Files Deleted
Files Modified
Files Renamed
Directory Created
Directory Removed
Directory Renamed
Machine Unlock Report
Network Logon Report
Remote Interactive Logon Report
Service Logon Report
Kerberos Authentication Report
NTLM Authentication Report
Failed Logon Report
Failed Kerberos Authentication Report
Failed NTLM Authentication Report
Files Access Report
Files Created Report
Files Deleted Report
Files Modified/Written To Report
Files Renamed Report
Folders Accessed Report
Folders Created Report
Folders Deleted Report
Folders Renamed Report
File And Folder Attributes Change Report
Modify Files Security Report
Failed File And Folder Access Report
Security Event Log Cleared Report
System Time Changed Report
Applications Loaded/Executed Report
Applications Unloaded/Terminated Report
USB Inserted
USB Removed
File Created
Files Deleted
Files Modified
Files Renamed
Directory Created
Directory Removed
Directory Renamed
Compliance
FFIEC
Tier 1: Objective 1 Section 4
Tier 1: Objective 3 Section 1
Tier 1: Objective 4 Section 1
Tier 1: Objective 6 Section 10
Tier 1: Objective 7 Section 6
Tier 2: ARA Section 1
Tier 2: ARA Section 2
Tier 2: ARA Section 3
Tier 2: ARA Section 4
Tier 2: ARA Section 5
Tier 1: Objective 3 Section 1
Tier 1: Objective 4 Section 1
Tier 1: Objective 6 Section 10
Tier 1: Objective 7 Section 6
Tier 2: ARA Section 1
Tier 2: ARA Section 2
Tier 2: ARA Section 3
Tier 2: ARA Section 4
Tier 2: ARA Section 5
PCI-DSS
Requirement 2.1
Requirement 2.2
Requirement 6.3.1
Requirement 7.1.3
Requirement 7.2
Requirement 8
Requirement 10
Requirement 11
Requirement 2.2
Requirement 6.3.1
Requirement 7.1.3
Requirement 7.2
Requirement 8
Requirement 10
Requirement 11
NIST
ID.AM-6
ID.GV-2, ID.GV-4, ID.RA-3, ID.RA-4, ID.RA-5
ID.RM-1, ID.RM-2, ID.RM-3
PR.AC-1, PR.AC-3, PR.AC-4, PR.DS-9
PR.IP-1
PR.IP-11
PR.PT-3
DE.CM-1, DE.CM-3, DE.CM-7
ID.GV-2, ID.GV-4, ID.RA-3, ID.RA-4, ID.RA-5
ID.RM-1, ID.RM-2, ID.RM-3
PR.AC-1, PR.AC-3, PR.AC-4, PR.DS-9
PR.IP-1
PR.IP-11
PR.PT-3
DE.CM-1, DE.CM-3, DE.CM-7
HIPAA
164.306 (a)(1), a(2), a(3)
164.308 (a)(1)(i), a(1)(ii), a(1)(ii)(A)
164.308(a)(1)(ii)(D)
164.308(a)(3)(ii)(C)
164.308(a)(6)(ii)
164.312(b)
164.308(a)(5)(ii)(C)
164.308(a)(5)(ii)(D)
164.308 (a)(1)(i), a(1)(ii), a(1)(ii)(A)
164.308(a)(1)(ii)(D)
164.308(a)(3)(ii)(C)
164.308(a)(6)(ii)
164.312(b)
164.308(a)(5)(ii)(C)
164.308(a)(5)(ii)(D)
SOX
Segregation of Duties
Service Administrator Account Restrictions
Service Administrator Auditing
Service Administrator Account Access
Domain Controller Access Monitoring
Domain Controller Security Settings Changes
Changes to Important Active Directory Objects
Monitor Generic Administrator Account
Non-Active Directory User Access
Server Console Access Restrictions
Log Management Activity
Service Administrator Account Restrictions
Service Administrator Auditing
Service Administrator Account Access
Domain Controller Access Monitoring
Domain Controller Security Settings Changes
Changes to Important Active Directory Objects
Monitor Generic Administrator Account
Non-Active Directory User Access
Server Console Access Restrictions
Log Management Activity
SIEM CONNECTORS
Built-in smart connectors provide seamless integration with SIEM systems such as Splunk, QRadar, ArcSight, AlienVault, LogRhythm and others.
Create intelligent dashboards
Build drill down capabilities
Build drill down capabilities
Gain an In-Depth and complete view of activities
Collects missing information from the operating system to provide a complete audit trail
Collects missing information from the operating system to provide a complete audit trail
Faster indexing and searching capabilities on account of data sent as key value pairs
LT AUDITOR+ APP FOR SPLUNK
Dashboards
Active Directory
Files/Folders
Group Policy
Logon Server
Files/Folders
Group Policy
Logon Server
Suspicious Activity
Identify bulk rename operations
Track copying of large number of files
Monitor excessive failed logins
Review account lockout activity
Track copying of large number of files
Monitor excessive failed logins
Review account lockout activity
Best Practices
Elevated Privileges
System Access
Policy Changes
System Access
Policy Changes
* This offer is for new customers only.