Restore Active Directory and Group Policy Changes with LepideAuditor
Occasionally, changes made to Active Directory or Group Policy can be unauthorized or unwanted. In these cases, administrators need to be able to restore the changes back to their original state as quickly as possible to mitigate the effects that these changes have on the organisation. With its proprietary backup snapshot technology, LepideAuditor lets you roll-back unwanted Active Directory and Group Policy changes with a few clicks using the Lepide Object Restore Wizard.
How We Help in Active Directory Object Restore
and Rollback Changes
Capture Backup Snapshots
LepideAuditor captures backup snapshots of Active Directory Objects and Group Policy Objects. These snapshots contain the states of such objects in the default, or a user-defined, folder. You can copy this backup data to an external drive for safety and can use it to restore in the future. A user can either create a schedule to capture backup snapshots at periodic intervals or capture a snapshot manually at any time.
Easily Roll Back Changes
Active Directory and Group Policy Audit reports display all changes made. With one click, you can roll back any selected change and it will be reversed in seconds. For example, if a user has been provided Administrative privileges by mistake, simply right-click on its audit entry and click “Restore Change”. The administrative privileges for that user will be revoked instantly.
Restore Objects from Tombstone State
Deleted objects are moved to what is known as “Tombstone State,” and the native process to recover from it is a cumbersome and time-consuming one. The potentially serious implications of some of these changes mean that a better process is necessary. The Lepide Object Restore Wizard provides you with an easier and quicker way of restoring such objects from their tombstone state.
Active Directory Object Restoration
It is next to impossible to recover a permanently deleted object that is neither in “Tombstone” nor “Logically Deleted” state. LepideAuditor lets you restore such objects from a previously captured snapshot from when that object existed. Once you start Lepide Object Restore Wizard and select a backup snapshot, it compares the current state of Active Directory Objects to the selected snapshot and shows all changes including creation, modification, deletion and renaming of all objects. You can select the changes you want to restore and proceed with the wizard. You can also restore deleted users, along with their passwords, in the same way.
Group Policy Object Restoration
Group Policies are used to configure policies for different purposes, including IT security. Any unauthorized or suspicious change needs to be restored as soon as possible. The Lepide Object Restore Wizard compares the current state of Group Policies with the state stored in the selected snapshot and displays all changes. You can restore the entire Group Policy Object to its original state with a few clicks.
Report from Backup Snapshots
Generating a report to determine what the past state of Active Directory or Group Policy was using native method is impossible. Using backup snapshots, LepideAuditor generates numerous security reports for Active Directory and State reports for both Active Directory and Group Policy Objects. These reports provide in-depth insights on the state of objects, permissions, audit settings and object ownership as per that moment when the selected snapshot was captured.
Lepide have been nominated in three categories in the 2018 Computing Security Awards: Cloud-Computing Solution of the Year, Security Solution of the Year and the Customer Service Award.
Computing Security Awards
LepideAuditor is simple to install and setup and is an easy-to-use solution for auditing your IT environment.
LepideAuditor takes the strain out of change auditing and regulatory compliance with one of the most comprehensive solutions on the market.
IT Security Guru
It’s rare to find a solution which covers a such a wide range of auditing services, but ‘LepideAuditor’ is one of those rare exceptions.
Active Directory Lead
LepideAuditor is one of the most simple to use and feature-packed security suite for Microsoft-based environments. If you fear security breach, this is one of the most essential security perimeters.
LepideAuditor is an excellent audit solution. It gives IT teams complete information about what’s happening in the IT systems, the health of their servers and backup history.
The LepideAuditor is an invaluable toolset for any System Admin to audit Active Directory, Group Policy and Exchange server changes.
I really enjoyed the way LepideAuditor performs to audit the changes made to Active Directory and Group Policy Objects. I will certainly recommend it to anyone who is looking for an easy-to-use third party auditor.
LepideAuditor is highly recommended as it not only meets all requirements for Active Directory and Group Policy change auditing but also it is easy and friendly to use.
Roberto Di Lello
LepideAuditor is an excellent auditing solution. Some key features of the solution are compliance reports, health monitoring, alerts/notifications and the backup/restore functionality.
LepideAuditor honored as Gold winner in the 12th Annual 2016 Info Security PG’s Global Excellence Awards® in ‘Auditing’
LepideAuditor is a solid product that will likely do a good job for anyone who wants to know what administrative actions are being taken in their organization.
LepideAuditor received a gold certification in data loss prevention.
❝ LepideAuditor has brilliant search capabilities and was easy to use from the perspective of a non-technical end user – highly recommend it.❞
❝ LepideAuditor provided us with complete visibility over what was happening in our IT environment in a simple, cost-effective and scalable way.❞
❝ We're very pleased with how much more insight LepideAuditor gave us and impressed with the attentive customer service they provided.❞
❝ LepideAuditor takes the strain out of change auditing and regulatory compliance with one of the most comprehensive solutions on the market. ❞
More from Lepide
Insider Threats Don’t Apply to Me…Do They?
Despite being responsible for around 30% of all cybercrime, insider threats don’t seem to get the same attention when it comes to security budgets as preventing external attacks.Learn More ->
Popular Cyber Attack Methods and How to Mitigate Them
This White Paper will go through some of the most popular cyber-attack methods attackers are using and the steps you can take to mitigate the risks of you falling victim to them.Learn More ->
LepideAuditor 18.7 – Analyze Your Excessive Permissions
The latest version of the award-winning LepideAuditor now enables you to analyze users and objects with excessive permissions to help you avoid privilege abuse.Learn More ->
Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All trademarks acknowledged.