Simplified Microsoft platform security compliance and reporting
Enterprise Reporter Suite helps you keep your Microsoft environment — both on premises and cloud-based — secure and compliant. Comprehensive access assessments and built-in reporting provide deep visibility into Active Directory (AD)/Azure AD, Exchange/Exchange Online, Office 365, Azure, OneDrive for Business, Windows Servers, SQL Servers and NAS/SAN storage, including Azure resources, users, groups, permissions and other configurations.
Plus, the Enterprise Reporter Suite includes Security Explorer®, so you can quickly take action from within the Enterprise Reporter user interface to remove any inappropriate permissions. Security Explorer provides an array of additional security features, such as the ability to quickly grant, revoke, clone, modify and overwrite permissions from a central location. This combination of reporting and remediation facilitates security and compliance, enabling you to stay ahead of security vulnerabilities to prevent breaches.
Security and compliance visibility
Improve compliance with security best practices, internal policies and external regulations with visibility into the configuration of all critical IT assets in your Windows environment:
- Active Directory/Azure AD — AD users, groups, roles, organizational units and permissions; Azure AD users, groups, roles and application service principals
- Exchange/Exchange Online — Mailboxes, mail-enabled users, distribution groups, public folders, permissions and more
- Office 365 — The security and configuration of critical IT assets in Azure Active Directory, Exchange Online and OneDrive for Business
- Windows servers — On-premises shares, files, folders, printers, registry keys and services
- OneDrive for Business — File and folder permissions, including whether content can be shared internally or externally
- SQL Server — Database security configuration, including users, logins, roles and database permissions
- Azure resources — VMs, disks, network security groups, storage accounts and more
Know who has access to what resources across the enterprise network. Tighten security and pass IT audits by ensuring that access is provided strictly on a need-to-know basis.
Improved insights with IT Security Search
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Pre- and post-migration analyses
Plan for a migration or consolidation project with increased visibility to user and group dependencies, object matches and potential conflicts, and unused or disabled accounts as well as where resources, computers, files and folders exist. Easily decide what needs to be migrated before you begin and ensure the correct data and permissions were migrated after the move.
Visibility into tenants, subscriptions and licensing
Easily optimize Office 365 license allocation and service plan decisions with visibility into your tenants, subscriptions and licensing service plans.
Hosted resource optimization
Optimize Azure resource usage by gaining visibility into virtual machines and disk deployment, including how many, how large, how they are configured and more, so you can save on unnecessary and underutilized resources.
Report on and manage storage capacity planning and allocation on a variety of devices, including Windows file servers, network attached storage (NAS) and storage area networks (SANs).
Scalable data collection
Scale to environments of any size and geographic distribution. Schedule collections during off-peak hours to minimize the impact of data collection on network and server performance, and leverage the distributed collection architecture for load balancing.
Reduce database storage requirements and save more change history data by comparing discoveries and storing only the changes.
Automated reporting workflows
Ensure stakeholders get the reports they need, when they need them, with automated report generation and flexible scheduling of report delivery.
Separation of duties (SoD)
Honor departmental and business function boundaries by enabling auditors, help desk staff, IT managers and other stakeholders to get exactly the reports they need and nothing more.
Perform effective data analysis that meets the unique informational needs of your organization using predefined reports or creating new reports. Customize with advanced filtering and export multiple formats, including PDF, HTML, MHT, RTF, XLS, XLSX, CSV, text and images.
Common reporting portal
Export reports to our software knowledge portal for a unified reporting interface across the entire family of Quest security and compliance solutions.
Centralized permissions management
Make targeted or bulk changes to servers with the ability to grant, revoke or modify permissions. View and manage group membership settings directly in the access control list for a resource. Overcome access-denied errors by forcing permissions onto protected objects.
Enterprise–wide rights review
Eliminate the need to manually search each server for permissions. Search for inherited or explicit permissions on AD, file servers, Exchange server, SQL Server and SharePoint. Even search for permissions to services, tasks, users and groups.
Advanced security and permissions
Quickly back up permissions to take a baseline of your access controls, and revert to that baseline at any time to easily recover from accidental or malicious changes without having to restore data. Improve security and ensure that compliance requirements are enforced.
Export a database or spreadsheet listing the permissions on items anywhere in the directory tree. Filter the results to show only permissions that differ from the parent folder. Perform targeted searches for all locations that a particular group or user has access to across the network and export this data to create ad-hoc security reports.
Intuitive access controls
Security Explorer can back up and restore security settings to an alternate location, so you can be sure that appropriate access is in place on the new servers.
Back to category: Security & Compliance
Back to Solutions