STEALTHbits Solutions for Exchange


Published on

A brief presentation that gives a general overview of the STEALTHbits solutions that allow your organization to audit, report, monitor, prevent, and remediate changes within Exchange.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • What we do really well
    Help you understand
    Automate the collection, analysis & reporting of the data you need to see every day
    Instantiating workflows to remediate certain conditions like object staleness and access
    Fulfill ad-hoc requirements – Alleviating the need to script, analyze data manually, and piece things together using multiple toolsets
    Instantiate and enforce policies that prevent particular events from happening

    ….and doing this at the largest scales

    What we’re not
    We’re not a black box – we’re a platform
    We’re not a brainless reporting solution for metrics and mailbox sizes
    We’re not a Diagnostic tool
  • Engage with us
    Go to our website to learn more
    Request a Trial of what it is that we spoke about today
  • STEALTHbits Solutions for Exchange

    1. 1. STEALTHbits Technologies, Inc. Exchange Management Solutions
    2. 2. STEALTHbits Technologies All About Data. Why Go With STEALTHbits? For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher. 300+ clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
    3. 3. STEALTHbits Technologies All About Data.  Deep-level auditing, reporting, and remediation workflows for Exchange and Exchange-related infrastructure  Agent-less  On-premise STEALTHbits’ Exchange Product Portfolio  Real-time monitoring and prevention of change and access for Exchange and Active Directory  Agent-based  On-premise
    4. 4. STEALTHbits Technologies All About Data. StealthAUDIT® Management Platform MESSAGING EXCHANGE Groups | Users | Computers CENTRALIZED RESOURCE MANAGEMENT DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING 35+ Data Collection Sources Agentless/Applet/Driver Architecture Extensible Framework, Easy Additions Correlate Conformance Notification Change Rules/Scorecard History/Trends Communicate Add Workflow Automate Modify Delete Static Dynamic Interactive SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE SHAREPOINT FILE SYSTEM SQL DESKTOPS SERVERSMOBILITY LYNC DIRECTORY SERVICES LDAP ACTIVE DIRECTORY
    5. 5. AD EX FS SP SQL OS MOB Private Store Public Store Metabase Tracking Logs Logs Databases Devices Infrastructure Users Groups Policies Schema Permissions Shares Files Event Logs Farms Sites Folders Lists Permissions Tables Instances Event Logs Services Event Logs WMI System/Disk DNS Ex Configuration Ex Mailbox Ex Public Folder Ex Metrics SP Content SP Activity PerfMON Disk Info Registry Services Patch Check System Info WMI Text Search PowerShell Command Line SmartLog Event Log BlackBerry File System File Access File Activity SP Access Ex PowerShell Active Directory LDAP Group Policy Users & Groups AD Inventory SQL ODBC UNIX VB Script INI File Correlation Conformance Change Detection Rules & Scorecards History & Trending Notification & Alerting Survey Mailbox Public Folder Active Directory File System SharePoint RegistryMail Merge Web-based Dashboards Data ExportBuilt-in Reporting Engine START FINISH DATA COLLECTION 1 ANALYSIS 2 REMEDIATION 3 REPORTING 4 Exchange Data Access Governance Active Directory Systems Governance Automated Solutions
    6. 6. STEALTHbits Technologies All About Data. StealthINTERCEPT® ACTIVE DIRECTORY (INCLUDING GROUP POLICY & LDAP) FILE SYSTEM RULES ENGINE Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®) CHANGE MONITORING Who Made the Change? Proactively Prevent Changes Historical Retention for Audit & Compliance REPORTING CHANGE BLOCKING ALERTING Real-time Syslog to SIEM & Event Notification EXCHANGE
    7. 7. STEALTHbits Technologies All About Data. StealthINTERCEPT® Product Architecture Block Report ! Alert  SIEM
    8. 8. STEALTHbits Technologies All About Data. Logical Product Architecture Permissions & Access Usage Configuration Exchange SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING Active Directory Non-Exchange DataSources STEALTHbits metabase UC Mobility Operating System Databases, & External Feeds
    9. 9. STEALTHbits Technologies All About Data. STEALTHbits’ Exchange Solution Set Access  Who has access to what?  Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers  What type of access do they have?  Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships Usage & Clean-up  Who is using what?  Operations & Maintenance  Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)  Security  Mailbox Logons, Permission Changes, Membership Changes Investigation  Productivity Concerns  Is someone close to reaching their mailbox quota?  Is someone receiving too much mail?  Security Concerns  Where are improper permissions applied?  Who has excessive access or membership?  What objects have excessive access or membership?  Who can impersonate another user (Send As)?  Who has Full Mailbox Access to a mailbox?  Who has administrative access to Exchange?  Is someone modifying Exchange configurations?  Operational Concerns  Is someone causing excessive IIS Connections (AS, OWA, OAA)?  Is someone causing excessive Mail-Flow (send/receive)?  Are Delivery Times trending poorly?  Are databases reaching dangerous limits?  Has Exchange configuration drifted?
    10. 10. STEALTHbits Technologies All About Data.  Attend a Demo o Next Steps  Request a Trial o  Learn More o  Ask Us a Question o Free Trial!