如需獲得最佳網頁瀏覽體驗,請使用 IE 11 或更高版本、Chrome、Firefox 或 Safari。

超过一半的安全违规事件是由已在网络内部的某个人所致。 即使最好的外围防御也无法阻止内部威胁,因此还要拥有强大的Active Directory安全与监管,这非常重要。

要有效打击内部威胁,您需要保护所有敏感数据,遵守数据隐私规定,并且持续通过审核。 为此,您必须能够控制用户权限,密切关注特权用户活动。 但是,SIEM的表现取决于您为其提供的数据,而且原生日志存在巨大的差距,在重要方面缺乏保真度。

您需要一个安全性与合规性解决方案来限制您的漏洞,帮助您快速响应威胁和安全违规。

每日AD网络攻击
平均网络攻击成本
发现攻击之前

您可信赖的安全性与合规性解决方案

Quest是可信赖的供应商,提供适用于任何内部部署或混合Microsoft环境的安全性与合规性解决方案。 我们提供全套的解决方案,使您可以像严密保护外围一样保护内部环境,并确保持续的合规性。

监管

监管

监管

适当的监管让您能够对违规事件进行补救,并快速、有效地缓减内部威胁。 Quest解决方案可自动执行管理任务,包括配置和取消配置用户,以封堵安全漏洞和降低风险。 基于审批的工作流程增加了额外的一层监管和控制。

  • 简化的用户和组管理
  • 安全组策略管理
  • 自动化监管策略
阅读电子书: SharePoint Governance Best Practices
阅读白皮书: How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
阅读白皮书: Governing GPOs with a Layered Security Framework

识别风险

识别风险

识别风险

Quest解决方案提供跨内部部署、混合或云环境的整合报告。 您可以直接从报告中轻松确定用户访问权限并适当调整权限。 您还可以发现敏感数据的驻留位置,这样您即可确保其受到保护,甚至在第一时间阻止关键对象被更改。

  • 单一视图中的整合报告
  • 敏感数据发现和分类
  • 自动化且可扩展的报告
  • 现场补救
阅读电子书: 用于支持不断增长的虚拟工作人员的七大报告
阅读白皮书: OneDrive for Business Security and Monitoring
阅读电子书: Nine Best Practices to Reduce Active Directory Security Breaches and Insider Threats

检测和警报

检测和警报

检测和警报

通过提供对用户活动的实时审核以及对权限升级、不当更改及其他可疑活动提供警报,更快速地对潜在威胁发出警报。 您甚至可以实现响应自动化,禁用用户或撤消更改。

  • 全面审核和更改阻止
  • 实时警报和响应操作
  • 智能且可扩展的事件日志压缩
观看网络直播: Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home
阅读电子书: Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis
阅读电子书: Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs

响应

响应

响应

利用集中数据收集以及类似Google的搜索和取证调查引擎,快速轻松地查明安全事件的根源。 此外,您可以建立虚拟测试实验室以进行灾难恢复规划和加快灾难恢复 – 从祼机配置到林恢复。

  • 类似Google的搜索和取证调查
  • 用于进行灾难恢复规划的虚拟测试实验室
  • 全面的备份和恢复 – 内部部署、混合或云
阅读技术简报: Preparing for Attacks that Seek Total Annihilation
阅读白皮书: The Windows Server 2016 and Azure AD Recycle Bins, and Quest Recovery Solutions
阅读白皮书: Active Directory Recovery in a Cloud or Hybrid World

证明合规性

证明合规性

证明合规性

这些功能结合在一起,使您可以建立、保持并证明对广泛法规的合规性。 此外,Quest解决方案提供智能、可扩�����日志压缩功能,让您可以经济高效地存储审核数据达数年,同时确保其可用于安全调查和审核检查。

阅读白皮书: Key Strategies for Meeting GDPR Compliance Requirements
阅读白皮书: A Practical Guide for GDPR Compliance
阅读白皮书: Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework

资源

检测、防范内部攻击并从内部攻击中 恢复
数据表
检测、防范内部攻击并从内部攻击中 恢复
检测、防范内部攻击并从内部攻击中 恢复
您已构建了出色的外围防御,但是是否为已在网络内部的威胁做好准备?
阅读数据表
Top 10 Security Events to Monitor in Azure Active Directory and Office 365
电子书
Top 10 Security Events to Monitor in Azure Active Directory and Office 365
Top 10 Security Events to Monitor in Azure Active Directory and Office 365
Discover how native auditing tools can help with cloud security — and how to overcome their shortcomings.
阅读电子书
COVID-19 Active Directory Vulnerabilities and Attacks that Seek Total Annihilation
技术简报
COVID-19 Active Directory Vulnerabilities and Attacks that Seek Total Annihilation
COVID-19 Active Directory Vulnerabilities and Attacks that Seek Total Annihilation
Defending your IT infrastructure against cyber attacks has never been a simple task — and the current coronavirus pandemic has made it even tougher. With work from home exploding and IT teams forgoing security initiatives to enable remote access and ensure productivity of remote workers, attac
阅读技术简报
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
白皮书
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
Too many organizations limit the log data they collect because they can't afford to process everything their SIEM; it simply costs too much and generates far too many alerts. However, this decision leaves them unable to properly detect, investigate and remediate security incidents. The key to breaki
阅读白皮书
Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
白皮书
Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
NIST cybersecurity framework enables organizations to create a secure environment. Learn how to apply this framework to your AD and Microsoft environment.
阅读白皮书
Top Seven Reports for Supporting a Growing Virtual Workforce
电子书
Top Seven Reports for Supporting a Growing Virtual Workforce
Top Seven Reports for Supporting a Growing Virtual Workforce
IT environments are more dynamic than ever, and having more users working from home introduces new vulnerabilities. You undoubtedly want to take full advantage of the tools you already have to strengthen Office 365 security and compliance — but you probably just don’t have the time to go
阅读电子书
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
白皮书
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
How to implement NIST, ESAE and Red Forest Cybersecurity Principles in Active Directory
Smart companies are adopting NIST Cybersecurity and Microsoft’s ESAE (“Red Forest”) as models for protecting credentials, particularly those that reside in Active Directory. Download your complimentary copy of this white paper today to learn more.
阅读白皮书
Focusing on the Endpoint as a Key Element of Your Security Infrastructure
白皮书
Focusing on the Endpoint as a Key Element of Your Security Infrastructure
Focusing on the Endpoint as a Key Element of Your Security Infrastructure
Endpoints often store large quantities of corporate data – and contain virtually everything that attackers need to access your networks. There is a rapid increase in users working from home, which makes endpoint log management critical for the safety of your infrastructure. However, effective
阅读白皮书

博客

Active Directory Backup Methodologies for Your IT Disaster Recovery Plan

Active Directory Backup Methodologies for Your IT Disaster Recovery Plan

Learn about three Active Directory backup methodologies and discover how Quest Recovery Manager gives you the choices, flexibility and stability you need.

Eight Things to Look for in an Active Directory Disaster Recovery Solution

Eight Things to Look for in an Active Directory Disaster Recovery Solution

Shopping for an Active Directory disaster recovery solution? Here are the key capabilities to look for. Get them all in Quest Recovery Manager for AD.

Quest Security Assessments Reveal Top 4 Issues in Active Directory: Groups and OSs (Part 3 of 3)

Quest Security Assessments Reveal Top 4 Issues in Active Directory: Groups and OSs (Part 3 of 3)

In the third and final part of this Active Directory security issues series, we take a look at the problems with Groups and Operating Systems (OSs). Learn more.

Rising RDP Attacks as an Avenue for Ransomware; and Mitigation Strategies

Rising RDP Attacks as an Avenue for Ransomware; and Mitigation Strategies

Learn about the recent connection between Remote Desktop Protocol (RDP) and ransomware attacks, as well as how you can limit your exposure.

CISA Office 365 Alert and 10 Security Actions to Take Now by Sean Metcalf (from our latest TEC Talk)

CISA Office 365 Alert and 10 Security Actions to Take Now by Sean Metcalf (from our latest TEC Talk)

This blog post will outline the CISA alert, prior CISA advice for securing Office 365 and point you to a TEC Talk by Microsoft Certified Master Sean Metcalf (@PyroTek3) that addresses the 10 (and more) Azure AD and Office 365 security tasks to do now!

Top 3 Logs to Spot and Stop COVID-19 Workstation Attacks for Your Remote Workforce

Top 3 Logs to Spot and Stop COVID-19 Workstation Attacks for Your Remote Workforce

COVID-19 phishing and malware attacks start on user workstations. Monitor these three logs to stop and spot these attacks: Windows security log, Sysmon log, and the PowerShell log.

立即行动

检测内部威胁。 保护您的外围。 从安全攻击中恢复。