Solved

Reporting tool for active directory and NTFS security auditing

Posted on 2014-02-25
2
620 Views
Last Modified: 2014-09-03
I'm looking for an all-in-one tool that can report on our Active Directory and NTFS structure from a security standpoint. The organization I work for is preparing to be audited by HIPAA and are looking for a paid solution that can help us get ready.
0
Comment
Question by:kj_syence
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 40

Accepted Solution

by:
Adam Brown earned 500 total points
ID: 39886334
Nessus: http://www.tenable.com/products/nessus
Retina: http://www.beyondtrust.com/

Those are the two big vulnerability baseline programs that are available. They can go through your servers and check against a database of existing vulnerabilities so you can either address or document them for HIPAA. There are some other free tools you might want to use like DumpSec: http://www.experts-exchange.com/Software/Server_Software/Active_Directory/Q_28373896.html which will export ACL and User information.

Those should give you enough to have the information you need to prepare for HIPAA. It should be noted, though, that HIPAA controls care more about encryption and data security than they do network vulnerabilities. Vulnerabilities are a part of it, but you'll get dinged a lot harder if you aren't ensuring encryption of PII data if it leaves your environment.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question