Follow these three simple steps to configure LepideAuditor
with our Virtual Appliance

  1. Download the Virtual Appliance
  2. Import the Virtual Appliance into your Virtual Infrastructure
  3. Configure LepideAuditor and your target Infrastructure for monitoring

Virtual Appliance Deployment Guide

As simple as it is, you may require a little help getting started, download the guide here to get the Virtual Appliance up and running.

View Guide

LepideAuditor virtual appliance comes bundled with
everything you need to get started:

  • Windows Server 2012 R2 Evaluation Edition
  • Microsoft SQL Server 2014 Express Edition
  • LepideAuditor (Latest version with full functionality)
  • All other solution pre-requisites
  • User friendly, wizard driven GUI for easy implementation

Read all reviews

Read all stories

More from Lepide

A Quarter of NHS Trusts Have Zero Staff Who are Versed in Security

According to a Freedom of Information Request submitted by Redscan, approximately 25% of NHS trusts who responded to the request have zero qualified security personnel.

Learn More ->
Popular Cyber Attack Methods and How to Mitigate Them

This White Paper will go through some of the most popular cyber-attack methods attackers are using and the steps you can take to mitigate the risks of you falling victim to them.

Learn More ->
LepideAuditor 18.7 - Analyze Your Excessive Permissions

The latest version of the award-winning LepideAuditor now enables you to analyze users and objects with excessive permissions to help you avoid privilege abuse.

Learn More ->

Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2019 Lepide Software Private Limited. All trademarks acknowledged.