Introduction to Enterprise Reporter for Windows Servers
Enterprise Reporter for Windows Servers provides deep visibility into the security and configuration of Microsoft Windows Server, Azure, NAS devices and OneDrive for Business. Armed with this information, organizations can perform security assessments to understand who can access what data, how they got that access, as well as whether it can be shared with others inside or outside the organization. Perform pre-and post-migration analyses and optimize resource and license allocation. As a result, you’ll be empowered to perform more informed strategic planning and proactive management of the IT infrastructure.
Extend your visibility beyond file servers, Azure and OneDrive for Business to other on-premises and Office 365 environments with Enterprise Reporter Suite.
Gain insights into permissions for on-premises and cloud-based resources with easy-to-use reports on who can access:
Gain visibility into the configuration of critical IT assets in Windows file servers, NAS devices and OneDrive for Business to comply with security best practices, internal policies and external regulations. Report on permissions and access to:
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more, with rich visualizations and event timelines.
Determine which users and groups have access to resources across your entire environment, including both on-premises and cloud-based storage. Tighten security by removing any excessive access permissions using Security Explorer, which is included with Enterprise Reporter Suite.
Plan for a migration or consolidation project with increased visibility into where Azure resources, computers, files and folders on Windows Servers and OneDrive for Business exist. Easily decide what needs to be migrated before you begin and ensure the correct data and permissions were migrated after the move.
Optimize Microsoft Azure resource usage by gaining visibility into virtual machines and disk deployment, including how many, how large, how they are configured and more, so you can save on unnecessary and underutilized resources.
Make sure each local security configuration is aligned with domain-wide policies. Check local security policies, membership of local administrative groups and other security configuration information stored in registry keys.
Scale to Windows environments of any size. Schedule collections during off-peak hours to minimize the impact of data collection on network and server performance, and leverage the distributed collection architecture for load balancing.
Reduce database storage requirements and save more change history data by comparing Windows Server discoveries and storing only the changes.
Perform efficient, effective data analysis and satisfy the unique information needs of your organization using predefined reports or by creating new reports with even more attributes. Customize any report with advanced filtering, and choose from multiple formats, including PDF, HTML, MHT, RTF, XLS, XLSX, CSV, text and images.
Ensure stakeholders get the reports they need when they need them with automated report generation and delivery and flexible scheduling.
Disk space requirements will vary with the Enterprise Reporter components you install:
100 GB or more for larger environments
The Enterprise Reporter database is the storage location of all data collected for reporting. As such, the amount of hard disk space required is directly related to the amount of data being collected. The Database Size Estimator tool shipped with Enterprise Reporter can help determine how much space will be required.
SQL Server performance is needed to support inserting data into the database tables and to support querying that data for reporting purposes. To improve the performance of data collection or reporting, consider enhancing the SQL Server memory and processor.
Larger environments may have additional requirements for memory, processor, and hard disk space. There are many factors that can effect these requirements. For additional information please see release notes.
The following operating systems are supported for Enterprise Reporter components.
NOTE: It is not recommended that the server or console be installed on a domain controller.
The follow versions of Active Roles are supported as targets of Active Directory discoveries. See the Active Roles web site for hardware and software requirements for your version of Active Roles:
Enterprise Reporter can be configured to send discovery information to the following versions of IT Security Search. See the IT Security Search web site for the hardware and software requirements for your version of IT Security Search.
The following versions of SQL Server® are supported for the Enterprise Reporter database. See the Microsoft® web site for the hardware and software requirements for your version of SQL Server®:
SSL Encryption of SQL Server Connections using Certificates
Enterprise Reporter can be configured to work with a SQL Server® instance. To secure communications while working with Enterprise Reporter, data sent over connections to the SQL Server can be encrypted using an SSL certificate.
The steps required to configure this encryption are as follows.
The following required software is required for Enterprise Reporter.
To collect Active Roles information, the following software is required on the computer where the Enterprise Reporter Configuration Manager is installed and on the computer where the Enterprise Reporter node is installed:
For more information and installation instructions, see the Active Roles Quick Start Guide. The following additional considerations are required:
To collect Exchange® 2007 information, the following additional considerations are required:
To collect Exchange mailbox folders, the following additional considerations are required:
Role: ApplicationImpersonation –User:Administrator
To collect OneDrive information, the following additional software is required:
NOTE: PowerShell 3.0 and Microsoft SharePoint Online Management Shell are required on the node machines to collect OneDrive configuration settings.
NOTE: In addition, for OneDrive configuration settings to be collected successfully, an authorized connection must be established to the SharePoint Online service. To allow for credentials to be specified for your tenant, the “LegacyAuthProtocols” setting must be enabled on your tenant. To set this on your tenant, run the following commands using the Microsoft SharePoint Online Management Shell. This action must be performed on any node machine with Microsoft SharePoint Online Management Shell installed.
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
Import-Module -Name Microsoft.Online.SharePoint.PowerShell
Connect-SPOService -Url "<full tenant name>"
Set-SPOTenant -LegacyAuthProtocolsEnable $True
To collect Azure information, the following additional software is required:
NOTE: Microsoft Azure Active Directory Module for Windows PowerShell is required on the node machines to collect multi-factor authentication attributes for Azure Users.
The following services are required on the Enterprise Reporter server and nodes.
The following services must be enabled on discovery targets for collections.
For more information see the release notes.
Simplify discovery, reporting, and assessment on Windows Servers, NAS, and OneDrive for Business
In this new report from the Information Security Community on LinkedIn, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
This ebook explores the anatomy of an AD insider threat and details the best defense strategies against it.
See how to assess the state of your hybrid Active Directory with tips from a Microsoft MVP.
Why Worry About Hybrid AD Security? A prominent Microsoft MVP explains in this eBook.
Explore Active Directory security vulnerabilities and ways to mitigate risk of insider threats.
Hacking Active Directory – Security Lessons from a Penetration Tester. Learn prevention strategies from this white paper to keep your environment secure. Download to glean simple changes that can significantly elevate your security posture.
This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.
Simplify Microsoft on-premises and cloud-based platform security and compliance reporting
Gain deep visibility into discovery, reporting and project planning on AD and Azure AD
Easily perform capacity planning with efficient file storage analysis and reporting
Gain in-depth visibility into SQL Server database configuration, permissions and more
Track, audit and receive reports on all Windows File Server real-time system changes
Securely collect, store and receive event data from Windows, Unix and Linux systems
Manage Microsoft server security in real time from a single platform.