Seeing the un-seeable can be a challenge for IT. With billions of events to collect and review from a variety of sources, both on premises and in the cloud, it’s difficult to find relevant data and make sense of it. And in the event of a security breach, either internal or external, the ability to locate where the breach originated and what was accessed can make a world of difference.
IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool’s web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever to:
IT Security Search is a free solution available as part of several Quest solutions including Enterprise Reporter, Change Auditor, InTrust, Recovery Manager for AD, and Active Roles that pulls data and feeds it into a single pane of glass. From here, you can easily review and act upon all of the various activities in your on-premises or hybrid environment.
Gather native (Windows server, Unix/Linux, workstation and more) logs as well as third-party logs from across your diverse enterprise network with InTrust log management.
Conduct full-text search on long-term event log data and other server data for compliance and security purposes with InTrust, saving time spent looking for events.
Discover which AD objects have changed, including before and after values, and restore them in a few clicks with Recovery Manager for AD.
The following versions of data-providing systems are supported in this version of IT Security Search:
Additional requirements for the Recovery Manager for Active Directory connector:
Additional requirements for the Active Roles connector:
The IT Security Search Web interface works correctly with the following browsers:
The minimum supported monitor resolution is 1024x768.
To find out the disk requirements for IT Security Search installation please refer to the IT Security Search Support Page.
Easily correlate disparate IT data into an interactive search engine.
Discover how IT Security Search makes it easier than ever to assess, audit, alert, remediate and manage your Microsoft environment.
In this webcast, learn how to simplify and enhance Active Directory administration and security with IT Security Search.
This eBook provides solutions to stop insider threats, manage privileged accounts, simplify GPO management and administration.
This white paper explores how you can use Change Auditor and InTrust, either alone or in combination with your SIEM, to improve security and compliance while reducing costs.
Improve endpoint security and log management. Learn the top 3 workstation logs to monitor and how Quest InTrust and IT Security Search simplify the process.
NIST cybersecurity framework enables organizations to create a secure environment. Learn how to apply this framework to your AD and Microsoft environment.
Learn cybersecurity best practices to protect your organization against phishing, ransomware and other threats.
Simplify Microsoft on-premises and cloud-based platform security and compliance reporting
Securely collect, store and receive event data from Windows, Unix and Linux systems
Reduce backup recovery time and costs to reduce user impact
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.