Bring complete visibility to permissions, groups and assets with the Enterprise Reporter Suite
Enterprise Reporter Suite helps you keep your Microsoft environment — both on premises and cloud-based — secure and compliant. Comprehensive access assessments and built-in reporting provide deep visibility into Active Directory (AD)/Azure AD, Exchange/Exchange Online, Office 365, OneDrive for Business, Windows Servers, SQL Servers and NAS/SAN storage, including users, groups, permissions and other configurations.
Plus, the Enterprise Reporter Suite includes Security Explorer, so you can quickly take action from within the Enterprise Reporter user interface to remove any inappropriate permissions. Security Explorer provides an array of additional security features, such as the ability to quickly grant, revoke, clone, modify and overwrite permissions from a central location. This combination of reporting and remediation facilitates security and compliance, enabling you to stay ahead of security vulnerabilities to prevent breaches.
Improve compliance with security best practices, internal policies and external regulations with visibility into the configuration of all critical IT assets in your Windows environment:
Know who has access to what resources across the enterprise network. Tighten security and pass IT audits by ensuring that access is provided strictly on a need-to-know basis.
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Ensure a smooth domain or tenant migration or consolidation project by pinpointing user and group dependencies, object matches and potential conflicts, and unused or disabled accounts before the migration starts.
Implement a change review process by capturing historical configuration information and viewing detailed change history reports.
Report on and manage storage capacity planning and allocation on a variety of devices, including Windows file servers, network attached storage (NAS) and storage area networks (SANs).
Scale to environments of any size and geographic distribution. Schedule collections during off-peak hours to minimize the impact of data collection on network and server performance, and leverage the distributed collection architecture for load balancing.
Reduce database storage requirements and save more change history data by comparing discoveries and storing only the changes.
Ensure stakeholders get the reports they need, when they need them, with automated report generation and flexible scheduling of report delivery.
Honor departmental and business function boundaries by enabling auditors, help desk staff, IT managers and other stakeholders to get exactly the reports they need and nothing more.
Perform effective data analysis that meets the unique informational needs of your organization using predefined reports or creating new reports. Customize with advanced filtering and export multiple formats, including PDF, HTML, MHT, RTF, XLS, XLSX, CSV, text and images.
Make targeted or bulk changes to servers with the ability to grant, revoke or modify permissions. View and manage group membership settings directly in the access control list for a resource. Overcome access-denied errors by forcing permissions onto protected objects.
Eliminate the need to manually search each server for permissions. Search for inherited or explicit permissions on file servers, Exchange server, SQL Server and SharePoint. Even search for permissions to services, tasks, users and groups.
Quickly back up permissions to take a baseline of your access controls, and revert to that baseline at any time to easily recover from accidental or malicious changes without having to restore data. Improve security and ensure that compliance requirements are enforced.
Export a database or spreadsheet listing the permissions on items anywhere in the directory tree. Filter the results to show only permissions that differ from the parent folder. Perform targeted searches for all locations that a particular group or user has access to across the network and export this data to create ad-hoc security reports.
Security Explorer can back up and restore security settings to an alternate location, so you can be sure that appropriate access is in place on the new servers.
Disk space requirements will vary with the Enterprise Reporter components you install:
The following operating systems are supported for Enterprise Reporter components.
NOTE: It is not recommended that the server or console be installed on a domain controller.
The follow versions of Active Roles are supported as targets of Active Directory discoveries. See the Active Roles web site for hardware and software requirements for your version of Active Roles:
Enterprise Reporter can be configured to send discovery information to the following versions of IT Security Search. See the IT Security Search web site for the hardware and software requirements for your version of IT Security Search.
The following versions of SQL Server® are supported for the Enterprise Reporter database. See the Microsoft® web site for the hardware and software requirements for your version of SQL Server®:
SSL Encryption of SQL Server Connections using Certificates
Enterprise Reporter can be configured to work with a SQL Server® instance. To secure communications while working with Enterprise Reporter, data sent over connections to the SQL Server can be encrypted using an SSL certificate.
The steps required to configure this encryption are as follows.
To obtain links to the following required software, open the Enterprise Reporter Autorun.
To collect Active Roles information, the following software is required on the computer where the Enterprise Reporter Configuration Manager is installed and on the computer where the Enterprise Reporter node is installed:
For more information and installation instructions, see the Active Roles Quick Start Guide. The following additional considerations are required:
To collect Exchange® 2007 information, the following additional considerations are required:
The following services are required on the Enterprise Reporter server and nodes.
The following services must be enabled on discovery targets for collections.
For more information see the release notes.
Enterprise Reporter can help you improve your security posture. This tech brief describes the top 10 AD security reports you should run on a regular basis to reduce your attack surface and thwart attackers.
A move to the cloud requires Azure AD and Azure AD requires a modernized, on-premises AD. Failing this modernization, the complexities of integrating into Azure AD grow and the benefits of Office 365 shrink.
In this new report from the Information Security Community on LinkedIn, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.
In this informative white paper, Quest service partner XMS Solutions dives into the risks associated with legacy AD architectures as well as how to avoid them.
This ebook explores the anatomy of an AD insider threat and details the best defense strategies against it.
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
Gain deep visibility into discovery, reporting and project planning on AD and Azure AD
Easily perform capacity planning with efficient file storage analysis and reporting
Gain in-depth visibility into SQL Server database configuration, permissions and more
Simplify discovery, reporting, and assessment on Windows Servers, NAS, and OneDrive for Business
Track, audit and receive reports on all Windows File Server real-time system changes
Ensure security, compliance and control of AD and Azure AD.
Manage Microsoft server security in real time from a single platform.