Bring complete visibility into permissions, groups and assets
Enterprise Reporter for Active Directory provides deep visibility into Active Directory (AD) users, groups, roles, organizational units and permissions — as well as Azure AD users, groups, roles and application service principals. Armed with this information, organizations can perform security assessments, configuration change history reviews, pre- and post-migration analyses, and more, for more informed strategic planning and proactive management of the entire IT infrastructure.
Extend your visibility beyond AD and Azure AD to other on-premises environments and Office 365 workloads with Enterprise Reporter Suite.
Gain visibility into the configuration of critical IT assets in both Active Directory domains and Azure AD tenants. Comprehensive reports provide the insight necessary to ensure security and compliance with internal policies and external regulations.
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more, with rich visualizations and event timelines.
Plan for a smooth domain migration or consolidation project by pinpointing user and group dependencies, matching conflicts, and unused accounts before the migration starts.
Ensure appropriate Active Directory and Azure AD delegation by reporting on who has access to Active Directory domains and OUs, users, groups and computers, as well as Azure AD users, groups, roles, applications and permissions.
Capture historical configuration information on Active Directory users, groups, organizational units and permissions, and view detailed change history reports. Gain in-depth insight for historical analysis and compliance reporting.
Scale to Active Directory environments of any size and geographic distribution. Schedule collections during off-peak hours to minimize the impact of data collection on network and server performance, and leverage the distributed collection architecture for load balancing.
Ensure stakeholders get the reports they need when they need them with automated report generation and flexible scheduling of report delivery.
Honor departmental and business function boundaries by enabling auditors, help desk staff, IT managers and other stakeholders to get exactly the reports they need and nothing more.
Perform effective data analysis that meets the unique informational needs of your organization using predefined reports or creating new reports. Customize with advanced filtering and export multiple formats, including PDF, HTML, MHT, RTF, XLS, XLSX, CSV, text and images.
Disk space requirements will vary with the Enterprise Reporter components you install:
The following operating systems are supported for Enterprise Reporter components.
NOTE: It is not recommended that the server or console be installed on a domain controller.
The follow versions of Active Roles are supported as targets of Active Directory discoveries. See the Active Roles web site for hardware and software requirements for your version of Active Roles:
Enterprise Reporter can be configured to send discovery information to the following versions of IT Security Search. See the IT Security Search web site for the hardware and software requirements for your version of IT Security Search.
The following versions of SQL Server® are supported for the Enterprise Reporter database. See the Microsoft® web site for the hardware and software requirements for your version of SQL Server®:
SSL Encryption of SQL Server Connections using Certificates
Enterprise Reporter can be configured to work with a SQL Server® instance. To secure communications while working with Enterprise Reporter, data sent over connections to the SQL Server can be encrypted using an SSL certificate.
The steps required to configure this encryption are as follows.
To obtain links to the following required software, open the Enterprise Reporter Autorun.
To collect Active Roles information, the following software is required on the computer where the Enterprise Reporter Configuration Manager is installed and on the computer where the Enterprise Reporter node is installed:
For more information and installation instructions, see the Active Roles Quick Start Guide. The following additional considerations are required:
To collect Exchange® 2007 information, the following additional considerations are required:
The following services are required on the Enterprise Reporter server and nodes.
The following services must be enabled on discovery targets for collections.
For more information see the release notes.
Enterprise Reporter can help you improve your security posture. This tech brief describes the top 10 AD security reports you should run on a regular basis to reduce your attack surface and thwart attackers.
A move to the cloud requires Azure AD and Azure AD requires a modernized, on-premises AD. Failing this modernization, the complexities of integrating into Azure AD grow and the benefits of Office 365 shrink.
This ebook explores the anatomy of an AD insider threat and details the best defense strategies against it.
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
In this white paper, we provide a checklist for complying with EU GDPR compliance requirements.
Active Directory (AD) security is a constantly moving target. With AD acting as the foundation for resources accessed both on premises and in the cloud, it’s critical to assess what state your AD’s security is in, understanding where to look and what to l
Simplify Microsoft on-premises and cloud-based platform security and compliance reporting
Gain in-depth visibility into SQL Server database configuration, permissions and more
Simplify discovery, reporting, and assessment on Windows Servers, NAS, and OneDrive for Business
Ensure security, compliance and control of AD and Azure AD.
Securely collect, store and receive event data from Windows, Unix and Linux systems
Facilitate scheduled and ad hoc reporting, all at once or granularly, to gain a complete summary