A brief presentation that gives a general overview of the STEALTHbits solutions that allow your organization to audit, report, monitor, prevent, and remediate changes within Exchange.
2. STEALTHbits Technologies
All About Data. Why Go With STEALTHbits?
For over a decade, STEALTHbits
has been a trusted partner to
the world’s largest organizations,
and some of the smallest too.
STEALTHbits is a “roll up our sleeves”
organization that gets the job done –
an important trait in difficult times when
the stakes have never been higher.
300+ clients across
5 continents
5 out of the top 6
Global Financials
OEM’ed by
Gartner’s Leading
IAM platforms
Integrated w/
biggest names in
technology
96% Customer
Retention Rate 65% Techs
Self-funded since
day 1
3. STEALTHbits Technologies
All About Data.
Deep-level auditing, reporting, and remediation workflows for
Exchange and Exchange-related infrastructure
Agent-less
On-premise
STEALTHbits’ Exchange Product Portfolio
Real-time monitoring and prevention of change and access for
Exchange and Active Directory
Agent-based
On-premise
4. STEALTHbits Technologies
All About Data. StealthAUDIT® Management Platform
MESSAGING
EXCHANGE
Groups | Users | Computers
CENTRALIZED RESOURCE MANAGEMENT
DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING
35+ Data Collection Sources
Agentless/Applet/Driver Architecture
Extensible Framework, Easy Additions
Correlate Conformance
Notification
Change Rules/Scorecard
History/Trends
Communicate Add
Workflow
Automate Modify
Delete
Static
Dynamic
Interactive
SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE
SHAREPOINT
FILE SYSTEM
SQL
DESKTOPS
SERVERSMOBILITY LYNC
DIRECTORY SERVICES
LDAP
ACTIVE DIRECTORY
5. AD EX FS SP SQL OS MOB
Private Store
Public Store
Metabase
Tracking Logs
Logs
Databases
Devices
Infrastructure
Users
Groups
Policies
Schema
Permissions
Shares
Files
Event Logs
Farms
Sites
Folders
Lists
Permissions
Tables
Instances
Event Logs
Services
Event Logs
WMI
System/Disk
DNS
Ex Configuration
Ex Mailbox
Ex Public Folder
Ex Metrics
SP Content
SP Activity
PerfMON
Disk Info
Registry
Services
Patch Check
System Info
WMI
Text Search
PowerShell
Command Line
SmartLog
Event Log
BlackBerry
File System
File Access
File Activity
SP Access
Ex PowerShell
Active Directory
LDAP
Group Policy
Users & Groups
AD Inventory
SQL
ODBC
UNIX
VB Script
INI File
Correlation Conformance
Change
Detection
Rules & Scorecards
History &
Trending
Notification &
Alerting
Survey Mailbox Public Folder
Active
Directory
File System SharePoint RegistryMail Merge
Web-based Dashboards Data ExportBuilt-in Reporting Engine
START
FINISH
DATA
COLLECTION
1
ANALYSIS
2
REMEDIATION
3
REPORTING
4
Exchange
Data Access
Governance
Active
Directory
Systems
Governance
Automated Solutions
6. STEALTHbits Technologies
All About Data. StealthINTERCEPT®
ACTIVE DIRECTORY
(INCLUDING GROUP POLICY & LDAP)
FILE SYSTEM
RULES ENGINE
Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®)
CHANGE MONITORING
Who Made the Change? Proactively Prevent Changes
Historical Retention for Audit & Compliance
REPORTING
CHANGE BLOCKING
ALERTING
Real-time Syslog to SIEM & Event Notification
EXCHANGE
8. STEALTHbits Technologies
All About Data. Logical Product Architecture
Permissions &
Access
Usage Configuration
Exchange
SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING
Active
Directory
Non-Exchange
DataSources
STEALTHbits
metabase
UC Mobility
Operating
System
Databases,
& External
Feeds
9. STEALTHbits Technologies
All About Data. STEALTHbits’ Exchange Solution Set
Access Who has access to what?
Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers
What type of access do they have?
Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships
Usage &
Clean-up
Who is using what?
Operations & Maintenance
Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)
Security
Mailbox Logons, Permission Changes, Membership Changes
Investigation Productivity Concerns
Is someone close to reaching their mailbox quota?
Is someone receiving too much mail?
Security Concerns
Where are improper permissions applied?
Who has excessive access or membership?
What objects have excessive access or membership?
Who can impersonate another user (Send As)?
Who has Full Mailbox Access to a mailbox?
Who has administrative access to Exchange?
Is someone modifying Exchange configurations?
Operational Concerns
Is someone causing excessive IIS Connections
(AS, OWA, OAA)?
Is someone causing excessive Mail-Flow
(send/receive)?
Are Delivery Times trending poorly?
Are databases reaching dangerous limits?
Has Exchange configuration drifted?
10. STEALTHbits Technologies
All About Data.
Attend a Demo
o www.stealthbits.com/events
Next Steps
Request a Trial
o www.stealthbits.com/trial
Learn More
o www.stealthbits.com/resources
Ask Us a Question
o www.stealthbits.com/company/contact-us
Free Trial!
http://www.stealthbits.com/Trial
Notes de l'éditeur
What we do really well
Help you understand
Usage
Access
Configuration
Automate the collection, analysis & reporting of the data you need to see every day
Instantiating workflows to remediate certain conditions like object staleness and access
Fulfill ad-hoc requirements – Alleviating the need to script, analyze data manually, and piece things together using multiple toolsets
Instantiate and enforce policies that prevent particular events from happening
….and doing this at the largest scales
What we’re not
We’re not a black box – we’re a platform
We’re not a brainless reporting solution for metrics and mailbox sizes
We’re not a Diagnostic tool
Engage with us
Go to our website to learn more
Request a Trial of what it is that we spoke about today