SlideShare a Scribd company logo
1 of 32
Compliance
Quest Compliance Suite for Exchange for File Access for SharePoint * ,[object Object]
Visibility to an expected operational policy (user provisioning process)
Visibility of end user access (permissions)
Forensic analysis to determine who, what, when and how the deviation occurred from the assess phase
Notify of any changes to the expected state
Preventative controls to address the deviation from ever occurring in the first place
Address issue immediately
Document that the deviation is an exception and therefore authorized,[object Object]
Introducing ActiveRoles Server Practical Provisioning, Management, and Security for Active Directory, AD LDS and Beyond ActiveRoles Server offers a practical approach to automated Active Directoryuser provisioning and administration, for maximum security and efficiency
Key Features Provisioning End-to-End User and Group Lifecycle Management Automatic User and Group Provisioning and Deprovisioning Management Unified Active Directory and Active Directory Lightweight Directory Services (AD LDS – formerly ADAM) Management Automated group management Interfaces for Day-to-Day administrators, Help Desk, and end user self-service ADSI and PowerShell support for extensibility  Security Controlled Administration through Roles and Rules for a true least privilege model  Approval Workflow for Change Control Centralized Auditing & Reporting Add-on Applications Quickly and easily connect to existing HR/ERP system or ILM 2007 (MIIS) to provision and synchronize Active Directory Simplified Exchange Resource Forest Management – from a single console Protection for critical DNS Services Compliant & Secure Access Management through Group Membership Self-Service
ActiveRoles Server Provisioning
Identity Lifecycle Management ,[object Object]
Accounts in Connected Systems Created
E-mail notificationsNew User is Provisioned (Hire) ,[object Object]
Mailbox and Home Folders Creation
Group and Distribution List MembershipsIdentity Administration ,[object Object]
Group and Distribution List Membership Changes
Self-serviceDeprovision (Retire) ,[object Object]
Disable Accounts
Disable Access to Resources
Assign Entitlements to othersReprovisioning (Promotion) ,[object Object]
Project Assignments
Information updates,[object Object]
ActiveRoles Server Management
Efficient Group Management Efficiency Extensive Group Management functionality saves Time, makes administrators more efficient, reduces errors and accuracy ensured by application of consistent policies Improves Administrator efficiency while reducing mistakes and security concerns. Exclude criteria provides separation of duties capability Group Membership Rules Automatically add users to groups based on a common set of policy rules. Dynamic Groups and Group Families Automatically add or remove users to groups according to a set of query based criteria - Bulk creation and population of groups
Web Based Day-to-Day Adminand Help Desk Web Consoles Simplifies day-to-day tasks and reduces administrative costs Provides alternate console for managing Active Directory Configurable with Point-and-click simplicity to meet customer needs Complete management of user, group, computer, and Microsoft Exchange Built with the latest ASP.NET technology
Empower UsersThrough Self-Service ,[object Object],Decreases help desk calls and IT time  Exchange GAL more accurate (info updated more easily/often) Allow employees to determine what personal info is published  ,[object Object],[object Object]
ARS Mgmt Shell for AD ,[object Object],New command line interface from Microsoft More “Unix” like usage The foundation of Exchange 2007 ,[object Object],Provides a command line for ActiveRoles Server Simplifies bulk operations Commands work with or without ActiveRoles Server, but maximum benefit only comes with ActiveRoles ownership ActiveRoles (at Microsoft’s request) is the first and only product to provide PowerShell commands for Active Directory Commands are subject to Rules, Roles and Approvals Microsoft PowerShell
Controlled Administrationwith Roles and Rules Provides administrative layer between users and Active Directory, for strict enforcement of operating policies and to eliminate unregulated access - Enforces “Least Privilege” Model Allows for centralized auditing and reporting of directory-related changes Simplifies the process of delegating rights by abstracting the required delegation into roles (or templates) that can be quickly deployed and easily maintained  Controls the administrative rights that individual accounts and groups get in Active Directory through role-based delegation Provides full reporting and import/export capabilities Provides multi-forest support
Roles Based Delegation Sr. Administrator Exchange Admins OU Admins / Help Desk Application / Data Owners End user Self-Service Day-to-Day Admin Active Directory Full Control Computers Domain Controllers AD Architect Mailbox Admin Create Mailbox, Move Mailbox APAC EMEA North America Service Desk New York Create Users/Groups Create Groups Reset Passwords, Unlock Accounts Mexico City Self-Service AD LDS Update personal Information Request Changes ADAM Objects App/Data Owners DNS Servers Change Group Membership DNS Records Job Function Roles  Access
Prevent Un-wanted Changewith Approval Workflow Management Solution Remediation - Deprovision Groups Applicationor Data Owner ApprovalWorkflow +   - Manage GroupMembership Or Review Owner Attestation Review Assistants IT Oversight VerificationReports IT Administrator Provides segregation of duties and tracking of request and responses to help with security and compliance

More Related Content

What's hot

Event Driven Architecture
Event Driven ArchitectureEvent Driven Architecture
Event Driven ArchitectureChris Patterson
 
SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides WSO2
 
Exchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanExchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanQuek Lilian
 
Malta soa infrastructure
Malta soa infrastructureMalta soa infrastructure
Malta soa infrastructureAngel Knight
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionMahendra Kulkarni
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Identity Management
Identity ManagementIdentity Management
Identity Managementrver21
 
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...goodfriday
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5Emirates Computers
 
Dependency Visualization with WSO2 Governance Registry 5.2
Dependency Visualization with WSO2 Governance Registry 5.2Dependency Visualization with WSO2 Governance Registry 5.2
Dependency Visualization with WSO2 Governance Registry 5.2WSO2
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningMike Reams
 
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraWindows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraQuek Lilian
 
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley ComplianceReducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley ComplianceMichael Findling
 
CadmiuCD Integrations
CadmiuCD IntegrationsCadmiuCD Integrations
CadmiuCD IntegrationsCadmiumCD
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureCitiusTech
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Laserfiche cloud factsheet
Laserfiche cloud factsheetLaserfiche cloud factsheet
Laserfiche cloud factsheetCorey Robert
 

What's hot (20)

Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
Event Driven Architecture
Event Driven ArchitectureEvent Driven Architecture
Event Driven Architecture
 
SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides SOA Governance in the Cloud Webinar Slides
SOA Governance in the Cloud Webinar Slides
 
BCC solutions for IBM Notes & Domino Infrastructure & Administration
BCC solutions for IBM Notes & Domino Infrastructure & AdministrationBCC solutions for IBM Notes & Domino Infrastructure & Administration
BCC solutions for IBM Notes & Domino Infrastructure & Administration
 
Exchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP PadmanExchange server 2010 overview_MVP Padman
Exchange server 2010 overview_MVP Padman
 
Malta soa infrastructure
Malta soa infrastructureMalta soa infrastructure
Malta soa infrastructure
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
 
DMS SOLUTION - 1
DMS SOLUTION - 1DMS SOLUTION - 1
DMS SOLUTION - 1
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
Building Web-Based Line-of-Business Applications on the Microsoft Dynamics Li...
 
EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5EMC Documentum Enterprise Content Management 6.5
EMC Documentum Enterprise Content Management 6.5
 
Dependency Visualization with WSO2 Governance Registry 5.2
Dependency Visualization with WSO2 Governance Registry 5.2Dependency Visualization with WSO2 Governance Registry 5.2
Dependency Visualization with WSO2 Governance Registry 5.2
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath PereraWindows 2008 Active Directory Branch office Management_MVP Sampath Perera
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
 
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley ComplianceReducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
 
CadmiuCD Integrations
CadmiuCD IntegrationsCadmiuCD Integrations
CadmiuCD Integrations
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on Azure
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Laserfiche cloud factsheet
Laserfiche cloud factsheetLaserfiche cloud factsheet
Laserfiche cloud factsheet
 

Viewers also liked

Entendendo o SELinux - Security Enhanced Linux
Entendendo o SELinux - Security Enhanced LinuxEntendendo o SELinux - Security Enhanced Linux
Entendendo o SELinux - Security Enhanced Linuxguest8881fe2a
 
Gerenciamento de identidades e acesso gia
Gerenciamento de identidades e acesso   giaGerenciamento de identidades e acesso   gia
Gerenciamento de identidades e acesso giaAlfredo Santos
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao DatacenterNetBR
 
Solução Gestão de Acesso e Segurança
Solução Gestão de Acesso e SegurançaSolução Gestão de Acesso e Segurança
Solução Gestão de Acesso e SegurançaSenior Sistemas
 
Gerência de Redes - 5.SNMPv3
Gerência de Redes - 5.SNMPv3Gerência de Redes - 5.SNMPv3
Gerência de Redes - 5.SNMPv3Mauro Tapajós
 
Gustavo Mota - CEO We do Logos
Gustavo Mota - CEO We do LogosGustavo Mota - CEO We do Logos
Gustavo Mota - CEO We do LogosWe Do Logos
 
IDM - Gereciamento de Identidades Corporativa
IDM - Gereciamento de Identidades CorporativaIDM - Gereciamento de Identidades Corporativa
IDM - Gereciamento de Identidades CorporativaDaniel Checchia
 
Auditoria em tecnologia da informação
Auditoria em tecnologia da informaçãoAuditoria em tecnologia da informação
Auditoria em tecnologia da informaçãoFernando Palma
 
Controle de acesso físico e lògico
Controle de acesso físico e lògicoControle de acesso físico e lògico
Controle de acesso físico e lògicoTais Florenço
 

Viewers also liked (12)

Entendendo o SELinux - Security Enhanced Linux
Entendendo o SELinux - Security Enhanced LinuxEntendendo o SELinux - Security Enhanced Linux
Entendendo o SELinux - Security Enhanced Linux
 
Asterisk
AsteriskAsterisk
Asterisk
 
Gerenciamento de identidades e acesso gia
Gerenciamento de identidades e acesso   giaGerenciamento de identidades e acesso   gia
Gerenciamento de identidades e acesso gia
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Guia do Sysadmin das Galáxias
Guia do Sysadmin das GaláxiasGuia do Sysadmin das Galáxias
Guia do Sysadmin das Galáxias
 
Solução Gestão de Acesso e Segurança
Solução Gestão de Acesso e SegurançaSolução Gestão de Acesso e Segurança
Solução Gestão de Acesso e Segurança
 
Gerência de Redes - 5.SNMPv3
Gerência de Redes - 5.SNMPv3Gerência de Redes - 5.SNMPv3
Gerência de Redes - 5.SNMPv3
 
Gustavo Mota - CEO We do Logos
Gustavo Mota - CEO We do LogosGustavo Mota - CEO We do Logos
Gustavo Mota - CEO We do Logos
 
IDM - Gereciamento de Identidades Corporativa
IDM - Gereciamento de Identidades CorporativaIDM - Gereciamento de Identidades Corporativa
IDM - Gereciamento de Identidades Corporativa
 
Auditoria em tecnologia da informação
Auditoria em tecnologia da informaçãoAuditoria em tecnologia da informação
Auditoria em tecnologia da informação
 
Controle de acesso físico e lògico
Controle de acesso físico e lògicoControle de acesso físico e lògico
Controle de acesso físico e lògico
 
Redes de Computadores - Modelo de Referência OSI/ISO
Redes de Computadores - Modelo de Referência OSI/ISORedes de Computadores - Modelo de Referência OSI/ISO
Redes de Computadores - Modelo de Referência OSI/ISO
 

Similar to Compliance

200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory SecurityArmando Leon
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptxmasbulosoke
 
iTEAM_Microsoft 2008 {heroes happen here} Event Presentation
iTEAM_Microsoft 2008 {heroes happen here} Event PresentationiTEAM_Microsoft 2008 {heroes happen here} Event Presentation
iTEAM_Microsoft 2008 {heroes happen here} Event Presentationfenia
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services OlivierMichot
 
Free help desk evaluation checklist
Free help desk evaluation checklistFree help desk evaluation checklist
Free help desk evaluation checklistIITSW Company
 
Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User ManagementNetIQ
 
Key features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheetKey features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheetIITSW Company
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBoni Yeamin
 
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementPhase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementScott Abel
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Erin
 
Presentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptxPresentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptxAbdoulayeSoulama1
 
User Manager
User ManagerUser Manager
User ManagerEmpowerID
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Cana Ko
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twppptMizuhashi Yuki
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007Amit Gatenyo
 
The Top 7 Active Directory Admin Challenges Overcome White Paper
The Top 7 Active Directory Admin Challenges Overcome White PaperThe Top 7 Active Directory Admin Challenges Overcome White Paper
The Top 7 Active Directory Admin Challenges Overcome White PaperNetIQ
 

Similar to Compliance (20)

200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
iTEAM_Microsoft 2008 {heroes happen here} Event Presentation
iTEAM_Microsoft 2008 {heroes happen here} Event PresentationiTEAM_Microsoft 2008 {heroes happen here} Event Presentation
iTEAM_Microsoft 2008 {heroes happen here} Event Presentation
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 
Free help desk evaluation checklist
Free help desk evaluation checklistFree help desk evaluation checklist
Free help desk evaluation checklist
 
Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User Management
 
sdonellan2016
sdonellan2016sdonellan2016
sdonellan2016
 
Key features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheetKey features in_smart_itsm_solution_datasheet
Key features in_smart_itsm_solution_datasheet
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
 
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementPhase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1Managing peak demand fluctuations bw admin and academic computing functions 1
Managing peak demand fluctuations bw admin and academic computing functions 1
 
Presentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptxPresentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptx
 
User Manager
User ManagerUser Manager
User Manager
 
Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102 Talk IT_Oracle AP_이진호 부장_111102
Talk IT_Oracle AP_이진호 부장_111102
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
 
Ikenstudiolive
IkenstudioliveIkenstudiolive
Ikenstudiolive
 
The Top 7 Active Directory Admin Challenges Overcome White Paper
The Top 7 Active Directory Admin Challenges Overcome White PaperThe Top 7 Active Directory Admin Challenges Overcome White Paper
The Top 7 Active Directory Admin Challenges Overcome White Paper
 

More from NetBR

Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao DatacenterNetBR
 
Lieb Soft
Lieb SoftLieb Soft
Lieb SoftNetBR
 
Santo Digital
Santo DigitalSanto Digital
Santo DigitalNetBR
 
Delegation
DelegationDelegation
DelegationNetBR
 
System Man
System ManSystem Man
System ManNetBR
 
Virtualization Consolidation Slide
Virtualization Consolidation SlideVirtualization Consolidation Slide
Virtualization Consolidation SlideNetBR
 

More from NetBR (6)

Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Lieb Soft
Lieb SoftLieb Soft
Lieb Soft
 
Santo Digital
Santo DigitalSanto Digital
Santo Digital
 
Delegation
DelegationDelegation
Delegation
 
System Man
System ManSystem Man
System Man
 
Virtualization Consolidation Slide
Virtualization Consolidation SlideVirtualization Consolidation Slide
Virtualization Consolidation Slide
 

Recently uploaded

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Recently uploaded (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Compliance

  • 2.
  • 3. Visibility to an expected operational policy (user provisioning process)
  • 4. Visibility of end user access (permissions)
  • 5. Forensic analysis to determine who, what, when and how the deviation occurred from the assess phase
  • 6. Notify of any changes to the expected state
  • 7. Preventative controls to address the deviation from ever occurring in the first place
  • 9.
  • 10. Introducing ActiveRoles Server Practical Provisioning, Management, and Security for Active Directory, AD LDS and Beyond ActiveRoles Server offers a practical approach to automated Active Directoryuser provisioning and administration, for maximum security and efficiency
  • 11. Key Features Provisioning End-to-End User and Group Lifecycle Management Automatic User and Group Provisioning and Deprovisioning Management Unified Active Directory and Active Directory Lightweight Directory Services (AD LDS – formerly ADAM) Management Automated group management Interfaces for Day-to-Day administrators, Help Desk, and end user self-service ADSI and PowerShell support for extensibility Security Controlled Administration through Roles and Rules for a true least privilege model Approval Workflow for Change Control Centralized Auditing & Reporting Add-on Applications Quickly and easily connect to existing HR/ERP system or ILM 2007 (MIIS) to provision and synchronize Active Directory Simplified Exchange Resource Forest Management – from a single console Protection for critical DNS Services Compliant & Secure Access Management through Group Membership Self-Service
  • 13.
  • 14. Accounts in Connected Systems Created
  • 15.
  • 16. Mailbox and Home Folders Creation
  • 17.
  • 18. Group and Distribution List Membership Changes
  • 19.
  • 21. Disable Access to Resources
  • 22.
  • 24.
  • 26. Efficient Group Management Efficiency Extensive Group Management functionality saves Time, makes administrators more efficient, reduces errors and accuracy ensured by application of consistent policies Improves Administrator efficiency while reducing mistakes and security concerns. Exclude criteria provides separation of duties capability Group Membership Rules Automatically add users to groups based on a common set of policy rules. Dynamic Groups and Group Families Automatically add or remove users to groups according to a set of query based criteria - Bulk creation and population of groups
  • 27. Web Based Day-to-Day Adminand Help Desk Web Consoles Simplifies day-to-day tasks and reduces administrative costs Provides alternate console for managing Active Directory Configurable with Point-and-click simplicity to meet customer needs Complete management of user, group, computer, and Microsoft Exchange Built with the latest ASP.NET technology
  • 28.
  • 29.
  • 30. Controlled Administrationwith Roles and Rules Provides administrative layer between users and Active Directory, for strict enforcement of operating policies and to eliminate unregulated access - Enforces “Least Privilege” Model Allows for centralized auditing and reporting of directory-related changes Simplifies the process of delegating rights by abstracting the required delegation into roles (or templates) that can be quickly deployed and easily maintained Controls the administrative rights that individual accounts and groups get in Active Directory through role-based delegation Provides full reporting and import/export capabilities Provides multi-forest support
  • 31. Roles Based Delegation Sr. Administrator Exchange Admins OU Admins / Help Desk Application / Data Owners End user Self-Service Day-to-Day Admin Active Directory Full Control Computers Domain Controllers AD Architect Mailbox Admin Create Mailbox, Move Mailbox APAC EMEA North America Service Desk New York Create Users/Groups Create Groups Reset Passwords, Unlock Accounts Mexico City Self-Service AD LDS Update personal Information Request Changes ADAM Objects App/Data Owners DNS Servers Change Group Membership DNS Records Job Function Roles Access
  • 32. Prevent Un-wanted Changewith Approval Workflow Management Solution Remediation - Deprovision Groups Applicationor Data Owner ApprovalWorkflow + - Manage GroupMembership Or Review Owner Attestation Review Assistants IT Oversight VerificationReports IT Administrator Provides segregation of duties and tracking of request and responses to help with security and compliance
  • 33. Centralized Reportingand Change History Operations Tracking On-line Administrator Activity Tracking Compliance Checking
  • 34. QuestIntrust SIEM & AD , File and Exchange Protection
  • 35. What if you could… Obtain real-time, detailed tracking of all changes to Active Directory (AD) and Group Policy settings? Take corrective actions for undesired changes in AD and ADAM, eliminating downtime and security breaches caused by accidental deletions or modifications? Be notified in real-time when critical events and changes are detected in AD, ensuring your awareness of possible security violations and destructive changes? Ensure adherence to compliance regulations and internal policies by tracking all activity in your Active Directory environment? Protect Active Directory by preventing changes to the most critical Active Directory objects, down to the attribute level including Group Policy Object settings?
  • 36.
  • 40.
  • 41.
  • 42.
  • 43. Sample reports with drill-down functionality which enablesyou to find exactly what you are looking for All file access activity performed by that user All recently deleted files and by user
  • 44. More sample reports… Drill down information from file highlighted in red showing all modification to that file and by whom
  • 46. What if you could… Audit administrative rights on your domains, workstations and servers? Ensure that privileges that are granted are in conformance with your formal security policies? Provide configuration reports quickly with the most current information? Have the capability to take action on violations to security policies? Know what changes have taken place to objects in the directory? Satisfy the needs of different data consumers in your organization?
  • 50.
  • 51. Visibility to an expected operational policy (user provisioning process)
  • 52. Visibility of end user access (permissions)
  • 53. Forensic analysis to determine who, what, when and how the deviation occurred from the assess phase
  • 54. Notify of any changes to the expected state
  • 55. Preventative controls to address the deviation from ever occurring in the first place
  • 57. Document that the deviation is an exception and therefore authorized