Permission Change Analysis

Compare and analyze historic permission changes made to Active Directory, Exchange and File Servers

Start Free Trial

Analyze Historic Permission Changes with LepideAuditor

Ensuring that your users only have permissions to the data that they need to do their job, and nothing more, is a fundamental part of ensuring a policy of least privilege. To maintain such a policy, you will need to be aware of any unwanted or unauthorized changes taking place to your most critical systems, including Active Directory, File Server and Exchange Server.

How We Analyze Historic Permission Changes

  • Active Directory Permission Analysis Active Directory permission analysis is a simple way to see what changes have been made in the permissions of your Active Directory objects. It displays historical changes by letting you compare the permissions for selected objects between two specified date and time intervals. These reports can be archived and you can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk.
  • Exchange Server Permission Analysis Exchange Server permission analysis displays the historical changes made in the permissions of Exchange Server objects. Our solution allows you to compare the permissions for the selected objects between two date and time intervals. You can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk and archive the permission analysis records in their respective databases.
  • File Server Permission Analysis File Server permission analysis is a useful solution to help you keep track of changes made in the permissions of your files and folders. It displays the historical changes in the permissions and also lets you compare the permissions of files and folders between two date and time intervals. These reports can be archived and you can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk. It is also able to display whether the current permissions of parent folders are applicable to the respective subfolders and files.

Protect Core Systems – On-Premise and in the Cloud

You can also integrate with any of your favorite apps or SIEM solutions for even wider coverage.

More from Lepide

Blog
5 Benefits of Using Encryption Technology for Data Protection
Learn More ->
Whitepaper
How to Protect Personally Identifiable Information (PII)
Learn More ->
News
Lepide Now Covers the Broadest Range of Platforms on the Market
Learn More ->
Ready To Start Using Lepide?

We offer a fully functional free trial that runs for 15-days with no obligation at the end. If you don’t want to trial the solution, you can schedule an in-depth, personalized demo by clicking on the link below.

START FREE TRIAL Schedule a Demo
  • +1(0)-800-814-0578
  • |