Netwrix Auditor Vega

New product

Decision Netwrix Auditor Vega Provides management of security setti

More details

Decision Netwrix Auditor Vega Provides management of security settings and access to data in all key IT systems and applications. Netwrix Auditor Vega Provides an integrated approach to tracking changes in the IT infrastructure, controls all elements, constantly interacting with key systems: selects, collects and consolidates data, compiles and distributes reports. Netwrix Auditor Vega Allows you to prevent data leaks caused by insider attacks, and also facilitates the passage of auditing for compliance with regulations and allows you to be aware of the changes that privileged users make to various IT systems.

Main features of Netwrix Auditor Vega:

Netwrix Auditor for Active Directory
  • Automatic tracking, notification and reporting of changes to all attributes of AD objects and group policies (added, deleted and modified objects), changes in the configuration of workstations.
  • Fixing the values ​​before and after the changes. Restore the original values ​​of attributes and deleted objects.
Netwrix Auditor for Exchange
  • Monitoring changes in configuration settings, created and deleted mailboxes, storage [informationstores], protocol parameters and access rights.
  • Fixing the values ​​before and after the changes.
Netwrix Auditor for File Servers
  • Alerts and reports about file changes and attempts to access file resources.
  • Preparation of the access rights matrix for FZ-152 certification, compliance with standards: Sarbanes-Oxley, HIPAA, PCIDSS, etc.
  • Monitoring storage systems EMCVNX / VNXe / Celerra and NetApp Filer: fixing attempts to access files / folders.
Netwrix Auditor for Window Server
  • Control of servers running Windows.
  • Generate reports on all changes in the server configuration: in hardware devices, drivers, software, services, network settings, access rights.
Netwrix Auditor for Share Point
  • Monitoring changes in the settings of servers Share Point, access rights, control of unauthorized access to files and folders.
  • Reports about creating, deleting or changing the objects of Share Point (libraries, folders, files, etc.).
Netwrix Auditor for SQL Server
  • Control changes in the permissions to access SQL Server objects and audit changes to the contents of tables.
  • Accounting for changes made by third-party applications that use SQL Server.
  • Recognize unauthorized and unwanted changes.
Netwrix Auditor for VMware
  • Audit changes in the virtual environment VMware: control the creation of virtual machines to prevent uncontrolled growth in their number.
  • Tracking the excessive load of resources.
  • Support for VMwareVI3 and higher platforms, vSphere, ESX, ESXi.

Netwrix Auditor Vega 7.0

For purchase, please contact the sales department: Sales@allsoft.com , (495) 937-0150, 8-800-200-22-33
New in version 7.0:
  • Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
  • Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications. Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications. Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
  • Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications. Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications. Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
  • Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
  • Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
  • Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications. Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications. Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.
Search for specific audit data. Interactive search allows you to ask a question in English and quickly get a response - what data was changed, by whom and when, and also who has or had access to various IT systems and applications.