SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben...

14

Transcript of SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben...

Page 1: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...
Page 2: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...
Page 3: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...
Page 4: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

ApacheReportServer

ExecutiveDashboards

TechnicalReports

Raw DataAnalysis

XML DrivenCore Engine

Snap-inAnalysisModules

VB ScriptSupport

Snap-inData

Collectors

ActionsActions

Page 5: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

• Patch Validation• Hardware & Software

Inventory• Operating System

Configuration• Security Group

Membership• Application Auditing

Page 6: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

Where does StealthAUDIT fit?Hardware, Software, Security, Migration Preps, Maintenance & Clean-up, Configuration Management, Health & Diagnostics, and more.

Why should you use StealthAUDIT?Validate all patches and hotfixes are applied to all systems at both the operating system and application levelsIdentify malicious and unapproved software installed on user’s machinesVerify configuration compliance according to Organizational, Regulatory, and Industry Best Practice standardsUnderstand permissions, rights, and access to all or information sensitive workstationsPerform gap analysis to determine readiness for migrations or upgrades

Page 7: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

• Compliance• Health &

Diagnostics• Hardware &

Software Inventory• Configuration

Management• Vulnerability &

Security Assessment

Page 8: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

Where does StealthAUDIT fit?Hardware, Software, Security & Vulnerability Assessment, File System Maintenance & Clean-up, Configuration Management, Health & Diagnostics, and more.

Why should you use StealthAUDIT?Validate all patches and hotfixes are applied to all systems at both the operating system and application levelsComprehensive, flexible, simplified Server baseline and configuration managementVerify configuration compliance according to Organizational, Regulatory, and Industry Best Practice standardsUnderstand permissions, rights, and access to all or information sensitive serversMaintain system health through proactive capacity planning and removal of stale or unused resources

Page 9: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

• Configuration Management

• Message-flow Statistics• Exchange Assessment• Compliance• Operating System

Dependencies• Active Directory

Dependencies• Exchange InFocus

Dashboard• Capacity Planning and

Trending

Page 10: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

Where does StealthAUDIT fit?StealthAUDIT is a complete Exchange management solution providing comprehensive visibility into the entire Exchange application and all of its associated dependencies

Why should you use StealthAUDIT?Detect critical configuration changes to reduce and avoid outagesIdentify growth trends to assist in capacity planning effortsProgrammatically Assess and Clean-up stale or unneeded content (PF, MB, DL)Obtain complete visibility into who has access to what and whereAnalyze Tracking Logs while reducing storage space and network bandwidth by up to 96%

Page 11: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

• Advanced Security• Compliance• Infrastructure• Maintenance & Clean-

up• Operations

Page 12: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

Where does StealthAUDIT fit?StealthAUDIT is a complete Active Directory management solution providing comprehensive visibility into the entire AD structure

Why should you use StealthAUDIT?Determine who is making changes in ADAdhere to configuration standardsOptimize the performance of your AD infrastructureStreamline clean-up and maintenance efforts with Action ModulesUnderstand policy enforcement

Page 13: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

• Closes out the loop• Assess, Refine, Resolve

• Works with real-world workflow• Automates mass operations

• Public Folders• Mailboxes

• Used when targets exceed practical limits of manual operations

Page 14: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...

Unknown number of stale folders

Examine all 30K folders under top level folder

Narrowed down to 2500 folders

Survey folder owners for confirmation

Get approval from legal

Take folders offline

Clean-up Complete!