Start My 15-Day Free Trial
Analyze Historic Permission Changes with LepideAuditor
Ensuring that your users only have permissions to the data that they need to do their job, and nothing more, is a fundamental part of ensuring a policy of least privilege. To maintain such a policy, you will need to be aware of any unwanted or unauthorized changes taking place to your most critical systems, including Active Directory, File Server and Exchange Server.
How We Analyze Historic Permission Changes
Active Directory Permission Analysis
Active Directory permission analysis is a simple way to see what changes have been made in the permissions of your Active Directory objects. It displays historical changes by letting you compare the permissions for selected objects between two specified date and time intervals. These reports can be archived and you can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk.
Exchange Server Permission Analysis
Exchange Server permission analysis displays the historical changes made in the permissions of Exchange Server objects. Our solution allows you to compare the permissions for the selected objects between two date and time intervals. You can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk and archive the permission analysis records in their respective databases.
File Server Permission Analysis
File Server permission analysis is a useful solution to help you keep track of changes made in the permissions of your files and folders. It displays the historical changes in the permissions and also lets you compare the permissions of files and folders between two date and time intervals. These reports can be archived and you can also save separate reports on “Permission History” and “Compare Permission” in PDF, MHT or CSV formats on the disk. It is also able to display whether the current permissions of parent folders are applicable to the respective subfolders and files.
Lepide have been nominated in three categories in the 2018 Computing Security Awards: Cloud-Computing Solution of the Year, Security Solution of the Year and the Customer Service Award.
Computing Security Awards
LepideAuditor is simple to install and setup and is an easy-to-use solution for auditing your IT environment.
LepideAuditor takes the strain out of change auditing and regulatory compliance with one of the most comprehensive solutions on the market.
IT Security Guru
It’s rare to find a solution which covers a such a wide range of auditing services, but ‘LepideAuditor’ is one of those rare exceptions.
Active Directory Lead
LepideAuditor is one of the most simple to use and feature-packed security suite for Microsoft-based environments. If you fear security breach, this is one of the most essential security perimeters.
LepideAuditor is an excellent audit solution. It gives IT teams complete information about what’s happening in the IT systems, the health of their servers and backup history.
The LepideAuditor is an invaluable toolset for any System Admin to audit Active Directory, Group Policy and Exchange server changes.
I really enjoyed the way LepideAuditor performs to audit the changes made to Active Directory and Group Policy Objects. I will certainly recommend it to anyone who is looking for an easy-to-use third party auditor.
LepideAuditor is highly recommended as it not only meets all requirements for Active Directory and Group Policy change auditing but also it is easy and friendly to use.
Roberto Di Lello
LepideAuditor is an excellent auditing solution. Some key features of the solution are compliance reports, health monitoring, alerts/notifications and the backup/restore functionality.
LepideAuditor honored as Gold winner in the 12th Annual 2016 Info Security PG’s Global Excellence Awards® in ‘Auditing’
LepideAuditor is a solid product that will likely do a good job for anyone who wants to know what administrative actions are being taken in their organization.
LepideAuditor received a gold certification in data loss prevention.
❝ LepideAuditor has brilliant search capabilities and was easy to use from the perspective of a non-technical end user – highly recommend it.❞
❝ LepideAuditor provided us with complete visibility over what was happening in our IT environment in a simple, cost-effective and scalable way.❞
❝ We're very pleased with how much more insight LepideAuditor gave us and impressed with the attentive customer service they provided.❞
❝ LepideAuditor takes the strain out of change auditing and regulatory compliance with one of the most comprehensive solutions on the market. ❞
More from Lepide
What is UPnP and is it Safe?
UPnP is something that all of us have probably come into contact with without even realizing. It automates the process of device discovery and connectivity across a network.Learn More ->
Why Visibility is the C-Suite’s Greatest Security Risk
This whitepaper will help you to understand where you are vulnerable in terms of cyber security risk and what you can do to fix the problem.Learn More ->
“On the Fly” Classification Introduced into LepideAuditor 19.1
The latest version of LepideAuditor introduces key new functionality to help users with data discovery, classification and user/entity behavior analytics.Learn More ->