Improve company productivity with a Business Account.Sign Up

x
?
Solved

Identity management Tool

Posted on 2014-03-12
8
Medium Priority
?
359 Views
Last Modified: 2014-03-25
i am looking for a tool which exactly shows if a user has used the domain account to perform a task?
0
Comment
Question by:DukewillNukem
  • 4
  • 3
8 Comments
 
LVL 59

Expert Comment

by:McKnife
ID: 39924062
Please provide more details.
0
 

Author Comment

by:DukewillNukem
ID: 39924141
ok,that tool must clearly show that which one of our admins has logged on with his credentials from which computer
0
 
LVL 59

Expert Comment

by:McKnife
ID: 39924225
The event log on the DC shows who logged on where and when. Or what required info is not included there in?
0
Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

 

Author Comment

by:DukewillNukem
ID: 39925772
its not just that: we also need a product that can automatically discover, track, secure and audit privileged accounts throughout our cross-platform enterprise. we need to see which admin or service account is hidden in which system or application such as IIS,SQL,ASP. etc.

its for the purpose of cleaning up
0
 
LVL 59

Expert Comment

by:McKnife
ID: 39927354
> we need to see which admin or service account is hidden in which system or application such as IIS,SQL,ASP
->then you would like to know what accounts are used for services and scheduled task? Take a look at this freeware: http://www.cjwdev.co.uk/Software/ServiceCredMan/Info.html

For the rest, I am afraid I have no ideas.
0
 
LVL 62

Expert Comment

by:gheist
ID: 39928035
Force password expiration for "admins" and services will lock them out leaving 120 dB noise in DCs' event logs.
0
 

Accepted Solution

by:
DukewillNukem earned 0 total points
ID: 39942212
found this,looks exactly what we need:
http://www.liebsoft.com/privileged_identity_management/
0
 

Author Closing Comment

by:DukewillNukem
ID: 39952700
its what we need
0

Featured Post

Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Windows Firewall provides an important layer of protection and a rich interface to configure it. Unfortunately, it lacks item level filtering. This article details my process of implementing firewall-as-code to reduce GPO bloat.
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question