Solved

Identity management Tool

Posted on 2014-03-12
8
319 Views
Last Modified: 2014-03-25
i am looking for a tool which exactly shows if a user has used the domain account to perform a task?
0
Comment
Question by:DukewillNukem
  • 4
  • 3
8 Comments
 
LVL 53

Expert Comment

by:McKnife
Comment Utility
Please provide more details.
0
 

Author Comment

by:DukewillNukem
Comment Utility
ok,that tool must clearly show that which one of our admins has logged on with his credentials from which computer
0
 
LVL 53

Expert Comment

by:McKnife
Comment Utility
The event log on the DC shows who logged on where and when. Or what required info is not included there in?
0
 

Author Comment

by:DukewillNukem
Comment Utility
its not just that: we also need a product that can automatically discover, track, secure and audit privileged accounts throughout our cross-platform enterprise. we need to see which admin or service account is hidden in which system or application such as IIS,SQL,ASP. etc.

its for the purpose of cleaning up
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 53

Expert Comment

by:McKnife
Comment Utility
> we need to see which admin or service account is hidden in which system or application such as IIS,SQL,ASP
->then you would like to know what accounts are used for services and scheduled task? Take a look at this freeware: http://www.cjwdev.co.uk/Software/ServiceCredMan/Info.html

For the rest, I am afraid I have no ideas.
0
 
LVL 61

Expert Comment

by:gheist
Comment Utility
Force password expiration for "admins" and services will lock them out leaving 120 dB noise in DCs' event logs.
0
 

Accepted Solution

by:
DukewillNukem earned 0 total points
Comment Utility
found this,looks exactly what we need:
http://www.liebsoft.com/privileged_identity_management/
0
 

Author Closing Comment

by:DukewillNukem
Comment Utility
its what we need
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now