Notice: quest.com will be retired soon. Please visit our new site at software.dell.com
Quickly Review Security Events
Quickly review security logs with these top 11 report recommendations for Windows/Active Directory from Windows security expert Randy Franklin Smith.
Watch the webcast »

User Activity Monitoring

Monitoring User Activities and Systems Access

The Quest One Identity Solutions offering minimizes the burden imposed on IT by compliance and audit demands. In addition to providing control of access and administration of identities, Quest One improves the way you “prove” your compliance through automation and reporting consolidation.

For user activity monitoring Quest One gives you the ability to:

  • Immediately and effectively respond to a security crisis
  • Discover vulnerabilities in systems and policy
  • Prevent unauthorized access to systems and data
  • Proactively address security policy violations

Review the capability categories below to find a solution for your specific IT challenges.

Security Crisis Response

Quest One enables you to quickly and accurately determine and report on security incidents including what happened, who did what, how it was done, and who approved the access that resulted in the breach.

Vulnerability Discovery

Quest One provides the ability to quickly and easily find accounts and users that have inappropriate access rights. These capabilities include an extremely deep discovery of Active Directory environments as well as access governance for the entire enterprise.

Violation Prevention

Quest One enables you to lock down critical resources to ensure that users cannot maliciously or unintentionally access data they should not access or perform tasks they are not authorized to perform.

Browse the technology platform categories below to find solutions for your unique IT challenges.

Security Crisis Response

Quest One enables you to quickly and accurately determine and report on security incidents including what happened, who did what, how it was done, and who approved the access that resulted in the breach.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

Forensic Analysis

Discover the who, what, where, when and why of user access activities across a wide range of systems, applications and platforms.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

Activity Audit

Gather event details beyond the capabilities available in native logs and tools, and turn meaningless log data into meaningful intelligence.

  • Enterprise Reporter
    Enterprise Reporter is a scalable solution for auditing, analyzing and reporting on the configuration of Microsoft Active Directory, Windows Server and SQL Server across the enterprise.
  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Rights & Approval Reporting

Identify and control user and group access rights to resources enterprise-wide, including the history of rights – who requested, who approved and how frequently rights are used.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Vulnerability Assessment

Automate the discovery of inappropriate access rights, orphaned accounts, and “mis-authorized” accounts across the enterprise.

Vulnerability Discovery

Quest One provides the ability to quickly and easily find accounts and users that have inappropriate access rights. These capabilities include an extremely deep discovery of Active Directory environments as well as access governance for the entire enterprise.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Audit-driven Assessment

Discover the who, what, where, when and why of user access rights and activities across a wide range of systems, applications and platforms.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Policy Analysis

Track the validity and change history of security policy including changes to access rights, Group Policy objects and Exchange environments.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Rights Reporting

Quickly and easily assess exactly who has rights to what and whether those rights are appropriate – including request and approval history.

  • ActiveRoles Server

    ActiveRoles Server provides out-of-the-box user and group account management, strictly enforced administrator-based role security, day-to-day identity administration and built-in auditing and reporting for Windows-centric environments.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Change Tracking

Track changes to critical identity information including access rights, Group Policy objects, request and fulfillment and more.

Violation Prevention

Quest One enables you to lock down critical resources to ensure that users cannot maliciously or unintentionally access data they should not access or perform tasks they are not authorized to perform.

  • Enterprise Reporter
    Enterprise Reporter is a scalable solution for auditing, analyzing and reporting on the configuration of Microsoft Active Directory, Windows Server and SQL Server across the enterprise.
  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Rights/Account Assessment & Reporting

Quickly and easily assess exactly who has rights to what and whether those rights are appropriate – including request and approval history.

  • Change Auditor

    The Change Auditor family of products audits, alerts and reports on all changes made to: Active Directory (ADAM/ADLDS), Exchange, EMC, NetApp, SQL Server, Windows file servers and even queries against Active Directory—all in real time and without enabling native auditing.

Alerting

Generate “smart alerts” for any activity that falls outside of approved security policy. In addition, Quest One enables you to proactively and automatically mediate violations.

  • Enterprise Reporter
    Enterprise Reporter is a scalable solution for auditing, analyzing and reporting on the configuration of Microsoft Active Directory, Windows Server and SQL Server across the enterprise.
  • Identity Manager
    Dell One Identity Manager streamlines managing user identities, access privileges and security. Identity and access management (IAM) can now meet your business needs without being limited by your IT resources and capabilities.

Access Control Policy Definition & Reporting

Assess security policy and correctly associate access rights with the correct individual and report on the entire lifecycle of rights.

Get the most from your investment with help from our highly rated support team, training programs, and implementation services.