Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

User/Group/Share Reporting/Compliance Tool

Posted on 2014-10-24
4
Medium Priority
?
168 Views
Last Modified: 2014-10-27
Hello,

I was curious if there was a commerical tool available that allow for the tracking of what user/groups had access to files shares across the directory.

I have inherited a home built application that allows for that process - its a manual process but when kept up to date provides a nice report by user for network resources they have access to on the network.

This home grown app has 4 sections essentially.  The UI is web based with a SQL backend.
The first section provides an area to enter in the users, groups, and network resource
The second section provides an area to assign the users to groups or groups to users
The third sections provides an area to assign the users/groups to the network resource or the network resource to the users/groups
The fourth section is the reporting side where all the users are listed and by clicking on a user you can see the groups they belong to as well as the network resources they have access to.

The tool have been great for using in employee audits and we would like to continue using the tool but the current software sits on a 2003 box and its been confirmed from the original developer it won't survive a move to 2012.  The developer has suggested looking for a commercial app instead of rebuilding.

So my question is: Is there a commercial application with similar functionality for an SMB price?

thanks in advance
0
Comment
Question by:EA-170
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 13

Accepted Solution

by:
Rizzle earned 2000 total points
ID: 40402954
Hi,

Look into a tool called Varonis and AD manager. We have both tools and they are very good especially when we're ISO27001 accredited.
0
 

Author Comment

by:EA-170
ID: 40406979
Thanks for the Varonis tip - somehow I overlooked them in my search! From the online information they have what I am looking for.  Do you current use Varonis?
0
 
LVL 13

Expert Comment

by:Rizzle
ID: 40406999
We were in the trial phase but we're now awaiting approval to buy the Varonis licenses.

We're going to be using DataAdvantage

http://www.varonis.com/products/datadvantage/windows/

This can be run in a trial mode in your environment. But they also have one called Directory Services which is something we didn't look at due to already having AD Manager/Audit.

http://www.varonis.com/products/datadvantage/directory-services/
0
 

Author Comment

by:EA-170
ID: 40407082
thanks again for the suggestions
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question