User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Complete Event Log Viewing, Monitoring and Management.
David Johnson | Page #1 © 2009 Blackbaud What Every Blackbaud DBA Ought to Know Welcome to the Support Roundtable for DBAs Presenter: David Johnson, Technical.
Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.
ISV Partner Alliance Value Policy Policy Management for Microsoft® System Center.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Module 5: Creating and Configuring Group Policy
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lower costs and improve predictability Automation Enable service owners to focus on work that adds business value Reduce error-prone manual activities.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Maintaining Windows Server 2008 File Services
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Module 16: Software Maintenance Using Windows Server Update Services.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Lieberman Software Random Password Manager & Workflow Delegation.
Windows Vista: Volume Activation 2.0
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Module 14: Configuring Print Resources and Printing Pools.
Configuring Encryption and Advanced Auditing
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Lieberman Software Random Password Manager & Two-Factor Authentication.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 5: Creating and Configuring Group Policies.
1 Chapter Overview Defining Operators Creating Jobs Configuring Alerts Creating a Database Maintenance Plan Creating Multiserver Jobs.
Microsoft Management Seminar Series SMS 2003 Change Management.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Service Account Manager Centralized Management and Reporting of Windows Services.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Maintaining and Updating Windows Server 2008 Lesson 8.
SQL Database Management
Maintaining Windows Server 2008 File Services
Lesson 16-Windows NT Security Issues
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
A 5-minute overview of ADAudit Plus
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007

The Problem: Lack of insight into Windows systems As users, accounts, groups, and systems increase it becomes difficult to manage the IT infrastructure No details about the status of systems and no means of rapidly changing their configurations, when necessary Without centralized control and visibility into Windows systems organizations risk security vulnerabilities, system failures and performance degradation, and regulatory compliance violations Sarbanes-Oxley, HIPAA, PCI compliance requirements.

The Solution: User Manager Pro Suite Gain visibility into your deployed systems and rapidly resolve problems throughout the enterprise Proactive, centralized security and systems configuration solution Automate critical administration tasks on all Windows servers and workstations Modify groups, users, passwords, registries, policies, audit settings, rights, and more en masse Generate real-time, interactive reports for all data collected

Specifications Supports Microsoft Windows NT/2000/XP/Server 2003/Vista/Server 2008 Certified for Microsoft Windows Vista Utilizes SQL Server as the data store Multithreaded, deploys without installing agents on client systems First released in 1998 and frequently updated Administrative rights over host machine and target machines NetBIOS over TCP/IP (ports or 445)

Demonstration

Overcoming Limitations Other solutions do not offer enterprise functionality of auditing, reporting, automatic retries, and rapid changes to system configurations in parallel –Built-in Windows tools force administrators to work manually on a per-system basis –Scripts are time consuming to create, have no documentation, support, and troubleshooting drawbacks, and one failure can affect multiple systems and users

Changes en Masse Modify local accounts, local and global groups, user and group rights, security policies, audit settings, and AD attributes for all systems collectively with a simple right click Edit registry keys, values, and permissions Deploy and run executable files, including hotfixes and patches View and change Event Log settings Reboot, abort reboot, send messages to target systems Schedule changes to occur at specific times or recurring basis

Detecting Threats and Problems Locate existing security holes, unauthorized programs and processes, unauthorized user accounts, users with administrator rights, open shares, and malicious software threats not identified by antivirus vendors Resolve identified problems on all systems in minutes, avoiding disruptions to systems, downtime, and lost productivity “This is an excellent tool that all Windows network administrators should seriously consider adding to their toolbox.” Joseph L. Jorden Contributing Editor, Redmond Magazine

Reporting View constant stream of real-time system details including: users, groups, event logs, shares, files, folders, permissions, patches, service packs, registries, security settings, audit settings, rights, trusts, etc. Reports can be exported, filtered, and sorted for quick access to specific information Schedule and store reports in a SQL database for later review and action Modify settings directly from the interactive reports

Compliance Maintain compliance with Sarbanes-Oxley, HIPAA, PCI and other security regulations by ensuring and verifying that sensitive data is available only to authorized users Generate extensive reports for auditors with the details they request about Windows security settings: –Discover who is a member of the administrators group on every machine in the network –Find and disable all accounts with stale passwords –Learn the permissions granted to every user and group

Free Add-Ons Password Recovery Console: Let delegated users securely access and recover current local administrator passwords Web Reporting: Permit authorized users to access, sort, and filter reports through an audited web interface Register for the Webinar

Licensing & Availability Licensed by managed system Academic, GSA, non-profit, and volume discounts available Available now Free, fully functional evaluation available Download now from

Conclusion Questions? Phone: Joe Vachon Sales Engineer