Quickly Analyze Security
Uncover threats to your Windows network fast, with Quest’s Enterprise Security Reporter. Review security settings from Windows, AD, NTFS, SharePoint, SQL Server and more.
Download free trial »

Enterprise Security Reporter

Discovery and Reporting for Windows & Active Directory

Enterprise Security Reporter is an agent-less discovery and reporting solution for analyzing file security, group memberships and other security settings on Windows file servers, Active Directory servers, SharePoint servers and SQL Servers.

Enterprise Security Reporter provides the administrator with tools to compare, analyze, query and report on the security and configuration of the network, and includes customizable reports in eight file formats.

Enterprise Security Reporter is developed and supported by ScriptLogic (a wholly owned subsidiary of Quest Software).

Features

Enterprise Security Reporter retrieves and stores data on NTFS permissions, security policies, user accounts, group memberships, Active Directory, SharePoint and SQL Server security.

Discovery

  • Security Focus - Covers 15 different enterprise topics to report on, including the security of Users, Group Memberships, NTFS Permissions, Computer Policies, Shares, Printers, Services and Registry Keys
  • Distributed Discovery Servers - Discovery of security information can be localized on remote networks, lowering WAN utilization and increasing the speed of discovery
  • Full Support for NetApp Filers and "VFilers" - Increases the range of file server devices that can be analyzed for security weaknesses across the enterprise

Reporting

  • Categorized Reporting - Includes over 140 built-in reports for ease of use, a Report Builder to create semi-custom reports, and supports any third party reporting tool supporting a SQL database to write your own reports
  • Delta Comparisons - Compares two discovery “snapshots” to see security changes that have occurred
  • Report Customization Wizard - Allows custom reports to be built or SQL queries to be directly edited
  • Import/Export of Reports - Import and/or export definitions of reports for sharing or backup/restore purposes
  • Flexible Report Formats - Export generated reports in multiple formats including PDF, RTF, TXT, TIF and HTML
  • Automated Report Delivery - Scheduled reports to be delivered via any standard SMTP-based e-mail system

Screenshots

Discovering Active Directory - Items

Enterprise Security Reporter collects on a wide range of Active Directory information to provide useful reports on the state of your Active Directory. Individual Active Directory domain object types can be selected so that reports can be created based on the collected values.

Discovering Active Directory - Attributes

Object attributes are selected to be included in the discovery process. By allowing the selection of attributes, only those pieces of desired information are collected and the discovery process is optimized.

Discovering Active Directory - Organization Units

By selecting Organization Units, Enterprise Security Reporter will identify which subsets of Active Directory objects should be discovered.

Discovering Active Directory - Options

Should alternative credentials or a specific Discovery Server be desired, these options are available to customize the execution of the discovery.

Discovering Computer Information - Items

Enterprise Security Reporter also collects on a wide range of computer information to provide useful reports on the state of your servers and desktops. The discovery process can be further optimized by selecting only those desired data items.

Discovering Computer Information - Paths

Folder paths are selected to dictate which parts of a machines file system (and related security) should be discovered.

Discovering Computer Information - File Filters

File Filters limit which files (and their security) are discovered based on file extension.

Discovering Computer Information - Registry Keys

Unlike the Paths tab, security for specific registry keys can be identified here.

Discovering Computer Information - Options

Should alternative credentials, a specific Discovery Server be desired, or a particular folder depths be specified, these options are available to customize the execution of the discovery.

Managing Discoveries

Configuring the Discovery Server, their schedule and reviewing the results of discoveries is centralized, allowing a 1,000 foot view of the state of the data being discovered.

Turnkey Reporting - User Information

Utilize a wide range of built-in reports to review the state of your user security for both domain-based ad computer-based accounts. Report parameters are displayed for each selected report to provide a preview of the conditions that will be used when running the report.

Turnkey Reporting - Group Information

Utilize a wide range of built-in reports to review the state of your group security for both domain-based ad computer-based accounts. Report parameters are displayed for each selected report to provide a preview of the conditions that will be used when running the report.v

Turnkey Reporting - Change in Security

Enterprise Security Reporters Snapshot Comparison Reports take two discoveries and compare the states of security to determine the changes made between them.

Turnkey Reporting - Compliance

Enterprise Security Reporters comes with reporting packs for both SOX and HIPAA compliance standards to assist in assessing the security of Windows against these standards and to simplify the process of determining which reports should be run..

Advanced Reporting - Customization

Custom reports can be generated either from scratch or by selecting an existing report and modifying it. A comprehensive report generator is included with Enterprise Security Reporter that utilized a wizard-driven interface to generate reports.

Reporting - Scheduling

Reports can be scheduled to run and be delivered via email, allowing complete automation of the reporting process from discovery to delivery, making IT simultaneously more productive and secure.