Analyze Historic Permission Changes with LepideAuditor

Ensuring that your users only have permissions to the data that they need to do their job, and nothing more, is a fundamental part of ensuring a policy of least privilege. To maintain such a policy, you will need to be aware of any unwanted or unauthorized changes taking place to your most critical systems, including Active Directory, File Server and Exchange Server.

Over 5,000 Organizations Use LepideAuditor to Protect Their Businesses Against Data Breaches

How We Analyze Historic Permission Changes

Active Directory Permission Analysis

Active Directory permission analysis is a simple way to see what changes have been made in the permissions of your Active Directory objects. It displays historical changes by letting you compare the permissions for selected objects between two specified date and time intervals. These reports can be archived and you can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk.

Exchange Server Permission Analysis

Exchange Server permission analysis displays the historical changes made in the permissions of Exchange Server objects. Our solution allows you to compare the permissions for the selected objects between two date and time intervals. You can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk and archive the permission analysis records in their respective databases.

File Server Permission Analysis

File Server permission analysis is a useful solution to help you keep track of changes made in the permissions of your files and folders. It displays the historical changes in the permissions and also lets you compare the permissions of files and folders between two date and time intervals. These reports can be archived and you can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk. It is also able to display whether the current permissions of parent folders are applicable to the respective subfolders and files.

Read all reviews

Read all stories

More from Lepide

Blog
A Quarter of NHS Trusts Have Zero Staff Who are Versed in Security

According to a Freedom of Information Request submitted by Redscan, approximately 25% of NHS trusts who responded to the request have zero qualified security personnel.

Learn More ->
Whitepaper
Popular Cyber Attack Methods and How to Mitigate Them

This White Paper will go through some of the most popular cyber-attack methods attackers are using and the steps you can take to mitigate the risks of you falling victim to them.

Learn More ->
News
LepideAuditor 18.7 - Analyze Your Excessive Permissions

The latest version of the award-winning LepideAuditor now enables you to analyze users and objects with excessive permissions to help you avoid privilege abuse.

Learn More ->

Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2019 Lepide Software Private Limited. All trademarks acknowledged.