Seeing the un-seeable can be a challenge for IT. With billions of events to collect and review from a variety of sources, both on premises and in the cloud, it’s difficult to find relevant data and make sense of it. And in the event of a security breach, either internal or external, the ability to locate where the breach originated and what was accessed can make a world of difference.
IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool’s web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever to:
IT Security Search is available as part of several Quest solutions including Enterprise Reporter, Change Auditor, InTrust, Recovery Manager for AD, and Active Roles that pulls data and feeds it into a single pane of glass. From here, you can easily review and act upon all of the various activities in your on-premises or hybrid environment.
Gather native (Windows server, Unix/Linux, workstation and more) logs as well as third-party logs from across your diverse enterprise network with InTrust log management.
Conduct full-text search on long-term event log data and other server data for compliance and security purposes with InTrust, saving time spent looking for events.
Discover which AD objects have changed, including before and after values, and restore them in a few clicks with Recovery Manager for AD.
The following versions of data-providing systems are supported in this version of IT Security Search:
Additional requirements for the Recovery Manager for Active Directory connector:
Additional requirements for the Active Roles connector:
The IT Security Search Web interface works correctly with the following browsers:
The minimum supported monitor resolution is 1024x768.
To find out the disk requirements for IT Security Search installation please refer to the IT Security Search Support Page.
Easily correlate disparate IT data into an interactive search engine.
Learn how to investigate GPO changes with IT Security Search from Quest.
In this short video, learn how to investigate account lockouts with IT Security Search.
In this video, learn about investigating changes made via nested group access with IT Security Search from Quest.
Too many organizations limit the log data they collect because they can't afford to process everything their SIEM; it simply costs too much and generates far too many alerts. However, this decision leaves them unable to properly detect, investigate and remediate security incidents. The key to breaki
This eBook provides solutions to stop insider threats, manage privileged accounts, simplify GPO management and administration.
In this webcast, learn how to simplify and enhance Active Directory administration and security with IT Security Search.
Explore Active Directory security vulnerabilities and ways to mitigate risk of insider threats.