SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben...
Transcript of SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben...
![Page 1: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/1.jpg)
![Page 2: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/2.jpg)
![Page 3: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/3.jpg)
![Page 4: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/4.jpg)
ApacheReportServer
ExecutiveDashboards
TechnicalReports
Raw DataAnalysis
XML DrivenCore Engine
Snap-inAnalysisModules
VB ScriptSupport
Snap-inData
Collectors
ActionsActions
![Page 5: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/5.jpg)
• Patch Validation• Hardware & Software
Inventory• Operating System
Configuration• Security Group
Membership• Application Auditing
![Page 6: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/6.jpg)
Where does StealthAUDIT fit?Hardware, Software, Security, Migration Preps, Maintenance & Clean-up, Configuration Management, Health & Diagnostics, and more.
Why should you use StealthAUDIT?Validate all patches and hotfixes are applied to all systems at both the operating system and application levelsIdentify malicious and unapproved software installed on user’s machinesVerify configuration compliance according to Organizational, Regulatory, and Industry Best Practice standardsUnderstand permissions, rights, and access to all or information sensitive workstationsPerform gap analysis to determine readiness for migrations or upgrades
![Page 7: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/7.jpg)
• Compliance• Health &
Diagnostics• Hardware &
Software Inventory• Configuration
Management• Vulnerability &
Security Assessment
![Page 8: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/8.jpg)
Where does StealthAUDIT fit?Hardware, Software, Security & Vulnerability Assessment, File System Maintenance & Clean-up, Configuration Management, Health & Diagnostics, and more.
Why should you use StealthAUDIT?Validate all patches and hotfixes are applied to all systems at both the operating system and application levelsComprehensive, flexible, simplified Server baseline and configuration managementVerify configuration compliance according to Organizational, Regulatory, and Industry Best Practice standardsUnderstand permissions, rights, and access to all or information sensitive serversMaintain system health through proactive capacity planning and removal of stale or unused resources
![Page 9: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/9.jpg)
• Configuration Management
• Message-flow Statistics• Exchange Assessment• Compliance• Operating System
Dependencies• Active Directory
Dependencies• Exchange InFocus
Dashboard• Capacity Planning and
Trending
![Page 10: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/10.jpg)
Where does StealthAUDIT fit?StealthAUDIT is a complete Exchange management solution providing comprehensive visibility into the entire Exchange application and all of its associated dependencies
Why should you use StealthAUDIT?Detect critical configuration changes to reduce and avoid outagesIdentify growth trends to assist in capacity planning effortsProgrammatically Assess and Clean-up stale or unneeded content (PF, MB, DL)Obtain complete visibility into who has access to what and whereAnalyze Tracking Logs while reducing storage space and network bandwidth by up to 96%
![Page 11: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/11.jpg)
• Advanced Security• Compliance• Infrastructure• Maintenance & Clean-
up• Operations
![Page 12: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/12.jpg)
Where does StealthAUDIT fit?StealthAUDIT is a complete Active Directory management solution providing comprehensive visibility into the entire AD structure
Why should you use StealthAUDIT?Determine who is making changes in ADAdhere to configuration standardsOptimize the performance of your AD infrastructureStreamline clean-up and maintenance efforts with Action ModulesUnderstand policy enforcement
![Page 13: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/13.jpg)
• Closes out the loop• Assess, Refine, Resolve
• Works with real-world workflow• Automates mass operations
• Public Folders• Mailboxes
• Used when targets exceed practical limits of manual operations
![Page 14: SA CoreComps.ppt [Read-Only] · Microsoft PowerPoint - SA_CoreComps.ppt [Read-Only] Author: Ben Created Date: 3/13/2008 10:37:28 AM ...](https://reader033.fdocuments.in/reader033/viewer/2022042402/5f11349555c51549b95e68cb/html5/thumbnails/14.jpg)
Unknown number of stale folders
Examine all 30K folders under top level folder
Narrowed down to 2500 folders
Survey folder owners for confirmation
Get approval from legal
Take folders offline
Clean-up Complete!