Discover Where Your Most Sensitive Files and Folders Reside
Using the Classification Management section of File Server Resource Manager (FSRM), you can automatically uncover your most sensitive files and folders by scanning the content based on a range of pre-defined conditions. Identify data based on PII, credit card numbers, dates of birth, full names, addresses and much more. Identify which files and folders contain information relevant to compliance mandates such as PCI, GDPR, SOX, HIPAA and more.
Tag, Classify and Score Your Sensitive Data Based on Risk
FSRM allows you to set Classification Properties that enable you to classify your data and automate both tagging and scoring. This functionality will help you detect your most critical data fast and spot data that directly relates to specific business use cases. For example, under PCI compliance you will need to identify all files that could potentially contain credit card numbers and demonstrate you can easily report on where this data is as well as applying the relevant security policies to protect it.
Classify Files and Folders ‘On the Fly’
In the Classification Rules section of FSRM, you can create simple rules to classify data based on an initial discovery process and then automatically at the point of creation. Near real time classification of the data enables you to automatically organize it by relevant categories and makes it infinitely easier when you need to locate it for compliance purposes.
An Easier Way to Identify Where Specific Data Subject Information Resides
When editing a Classification Rule within FSRM, you can uncover where all information about a specific ‘data subject’ resides within your unstructured data using a simple ‘string value’ in the Classification Parameters configuration. This could help you to easily identify where all relative data resides across your unstructured data if under request by a data subject who is exercising their rights to be forgotten.
Get Detailed Analysis and Alerts on User Behaviour Through a Simple Integration
View All Your Most Sensitive Files and Folders in a Single, Flexible Report
A single report displays all your sensitive files and folders and allows you to filter, search or group for easy interrogation of the data. This feature of LepideAuditor enables you to add context to the raw data Microsoft provides and helps satisfy compliance audits. The data collected from multiple storage locations is then consolidated and centrally stored for multilocation reporting capabilities.
Spot Potential Data Breaches and File/Folder Abuse Involving Your Sensitive Data
With just a simple right click, you can instantly create alerts to track critical changes to a sensitive file of folder. Our threshold-based alerting allows you to create alerts if a group of conditions are met. Get instant notifications when files are copied, moved, deleted, modified and renamed – or if permissions are modified. Track when files are accessed, or access attempts have been made over a period of time. Determine which files and folders are utilised by which users and when.
Spot Potential Data Breaches Involving Your Sensitive Data
Using the threshold alerting feature, LepideAuditor can create alerts to help you detect whether sensitive files and folders are being copied by specific users. The solution can alert based on either a single file being copied or moved or, more importantly, if a volume of specific files or folders are being copied within a specified timeframe.
Run One of Our Pre-Set User Behaviour Reports or Build Your Own
With our simple wizard, we’re able to schedule a report with multiple filters and a range of reporting options based upon either one, a few of or all the files in the sensitive data report. These reports can be scheduled to be automatically delivered to a user of your choice via email; enabling you to automate the delivery of the report to either the data owner, your DPO, a compliance officer or Information Security Manager. Reports have been specifically designed for security and compliance mandates such as PCI, GDPR, SOX, HIPAA and more.
Group Your Sensitive Data Easily by Type, Location, Data Owner and Last Accessed Date
With our flexible reporting platform you’re able to drag, drop and group reports by either classification type (i.e. Credit Card, PII) by data owner, by last accessed date or a combination of multiple filters. You can then easily search, or sort, based on text or wild cards. You may have multiple classification rules configured and data tagged with different severity levels to help you adhere to specific compliance regulations or security policies. This will then help you sort the data based upon the compliance requirement you are working towards with flexible reporting around your most sensitive files.
Ensure Appropriate Access Rights by Viewing Current and Historic Permissions to Your Unstructured Data
View Who Has Permissions to Your Sensitive Data
Being able to determine current permissions in your File Server helps to ensure that only the right users have access to the right data – which will enable you to enforce a Policy of Least Privilege. LepideAuditor enables you to easily uncover and visualize who currently has which permissions to your most sensitive files and folders by comparing applied NTFS and Share Permissions.
Identify How, When and by What Means Access Was Granted
Using the permissions exploration feature, determine by what means and method the access was granted to this data, who granted the access levels and when. A simple way of helping to reduce the risks of permission sprawl on your most important files and folders. This means that, if a user is given excessive permissions to sensitive data (either directly inherited from a parent directory or applied through group membership), you are able to easily identify the effective permissions and the complete scope as to how these permissions are being granted.
Uncover and Compare Historical Permissions to Sensitive Data
Once installed, you will be able to create snapshots of current permissions to allow you to keep a track of historical permissions and compare them with just a few clicks. This gives a complete view of permission evolution through time. Understanding what permissions were applied to sensitive data in the past, what those permissions are today and how the permissions have evolved through that designated window of time.
Explore What a Specific User or Group Has Access to and At What Level
Pick a user or a group and easily drill down to see exactly which files and folders this user can access. You can also see the permission levels that apply to the specific files and folders to help you maintain control of the levels of permissions to your critical data.
Identify Data ‘At Risk’ By Showing Current Open Shares
A simple report enables you to see a list of all the open shares that exist within your environment, along with the files and folders that reside within them to help ensure you can spot data that is over exposed and needs to be secured down.
Explore Security Principles Behind Your Open Shares
See the means by which the open shares were ‘opened’ to help give context to them and determine whether you have any security breaches. You can see how they became open, so that you can prevent further unnecessary open shares being created.
LepideAuditor is simple to install and setup and is an easy-to-use solution for auditing your IT environment.
LepideAuditor takes the strain out of change auditing and regulatory compliance with one of the most comprehensive solutions on the market.
IT Security Guru
It’s rare to find a solution which covers a such a wide range of auditing services, but ‘LepideAuditor’ is one of those rare exceptions.
Active Directory Lead
LepideAuditor is one of the most simple to use and feature-packed security suite for Microsoft-based environments. If you fear security breach, this is one of the most essential security perimeters.
LepideAuditor is an excellent audit solution. It gives IT teams complete information about what’s happening in the IT systems, the health of their servers and backup history.
The LepideAuditor is an invaluable toolset for any System Admin to audit Active Directory, Group Policy and Exchange server changes.
I really enjoyed the way LepideAuditor performs to audit the changes made to Active Directory and Group Policy Objects. I will certainly recommend it to anyone who is looking for an easy-to-use third party auditor.
LepideAuditor is highly recommended as it not only meets all requirements for Active Directory and Group Policy change auditing but also it is easy and friendly to use.
Roberto Di Lello
LepideAuditor is an excellent auditing solution. Some key features of the solution are compliance reports, health monitoring, alerts/notifications and the backup/restore functionality.
LepideAuditor honored as Gold winner in the 12th Annual 2016 Info Security PG’s Global Excellence Awards® in ‘Auditing’
LepideAuditor is a solid product that will likely do a good job for anyone who wants to know what administrative actions are being taken in their organization.
LepideAuditor received a gold certification in data loss prevention.
❝ LepideAuditor has brilliant search capabilities and was easy to use from the perspective of a non-technical end user – highly recommend it.❞
❝ LepideAuditor provided us with complete visibility over what was happening in our IT environment in a simple, cost-effective and scalable way.❞
❝ We're very pleased with how much more insight LepideAuditor gave us and impressed with the attentive customer service they provided.❞
❝ LepideAuditor takes the strain out of change auditing and regulatory compliance with one of the most comprehensive solutions on the market. ❞