Seeing the un-seeable can be a challenge for IT. With billions of events to collect and review from a variety of sources, it’s difficult to find relevant data and make sense of it. And in the event of a security breach, either internal or external, the ability to locate where the breach originated and what was accessed can make a world of difference.
IT Security Search, a feature of several other Quest solutions, is an intelligent looking glass that uses simple, natural search language to help IT administrators and security teams perform fast security incident response and forensic analysis. The tool’s web-based interface correlates disparate IT data from numerous systems and devices into a single console and makes it easier than ever to:
IT Security Search is a free solution available as part of several Quest solutions including Enterprise Reporter, Change Auditor, InTrust, Recovery Manager for AD, and Active Roles that pulls data and feeds it into a single pane of glass. From here, you can easily review and act upon all of the various activities in your environment.
Gather native (Windows server, Unix/Linux, workstation and more) logs as well as third-party logs from across your diverse enterprise network with InTrust log management.
Conduct full-text search on long-term event log data and other server data for compliance and security purposes with InTrust, saving time spent looking for events.
Discover which AD objects have changed, including before and after values, and restore them in a few clicks with Recovery Manager for AD.
The following versions of data-providing systems are supported in this version of IT Security Search:
Additional requirements for the Recovery Manager for Active Directory connector please refer to the IT Security Search Support Page.
The IT Security Search Web interface works correctly with the following browsers:
The minimum supported monitor resolution is 1024x768.
To find out the disk requirements for IT Security Search installation please refer to the IT Security Search Support Page.
Inside a Mock Breach Investigation
In this webcast, learn how to simplify and enhance Active Directory administration and security with IT Security Search.
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
In this white paper, we provide a checklist for complying with EU GDPR compliance requirements.
Learn about the key AD security threats that Federal government agencies face and discover how Quest solutions can protect critical systems and data from threats.
Simplify Microsoft on-premises and cloud-based platform security and compliance reporting
Securely collect, store and receive event data from Windows, Unix and Linux systems
Reduce backup recovery time and costs to reduce user impact
Simplify the security of your Active Directory