• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
STEALTHbits Solutions for Exchange

STEALTHbits Solutions for Exchange



A brief presentation that gives a general overview of the STEALTHbits solutions that allow your organization to audit, report, monitor, prevent, and remediate changes within Exchange.

A brief presentation that gives a general overview of the STEALTHbits solutions that allow your organization to audit, report, monitor, prevent, and remediate changes within Exchange.



Total Views
Views on SlideShare
Embed Views



2 Embeds 46

http://www.stealthbits.com 45
http://stealthbits.com 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • What we do really well <br /> Help you understand <br /> Usage <br /> Access <br /> Configuration <br /> Automate the collection, analysis & reporting of the data you need to see every day <br /> Instantiating workflows to remediate certain conditions like object staleness and access <br /> Fulfill ad-hoc requirements – Alleviating the need to script, analyze data manually, and piece things together using multiple toolsets <br /> Instantiate and enforce policies that prevent particular events from happening <br /> <br /> ….and doing this at the largest scales <br /> <br /> What we’re not <br /> We’re not a black box – we’re a platform <br /> We’re not a brainless reporting solution for metrics and mailbox sizes <br /> We’re not a Diagnostic tool <br />
  • Engage with us <br /> Go to our website to learn more <br /> Request a Trial of what it is that we spoke about today

STEALTHbits Solutions for Exchange STEALTHbits Solutions for Exchange Presentation Transcript

  • STEALTHbits Technologies, Inc. Exchange Management Solutions
  • STEALTHbits Technologies All About Data. Why Go With STEALTHbits? For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher. 300+ clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
  • STEALTHbits Technologies All About Data.  Deep-level auditing, reporting, and remediation workflows for Exchange and Exchange-related infrastructure  Agent-less  On-premise STEALTHbits’ Exchange Product Portfolio  Real-time monitoring and prevention of change and access for Exchange and Active Directory  Agent-based  On-premise
  • STEALTHbits Technologies All About Data. StealthAUDIT® Management Platform MESSAGING EXCHANGE Groups | Users | Computers CENTRALIZED RESOURCE MANAGEMENT DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING 35+ Data Collection Sources Agentless/Applet/Driver Architecture Extensible Framework, Easy Additions Correlate Conformance Notification Change Rules/Scorecard History/Trends Communicate Add Workflow Automate Modify Delete Static Dynamic Interactive SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE SHAREPOINT FILE SYSTEM SQL DESKTOPS SERVERSMOBILITY LYNC DIRECTORY SERVICES LDAP ACTIVE DIRECTORY
  • AD EX FS SP SQL OS MOB Private Store Public Store Metabase Tracking Logs Logs Databases Devices Infrastructure Users Groups Policies Schema Permissions Shares Files Event Logs Farms Sites Folders Lists Permissions Tables Instances Event Logs Services Event Logs WMI System/Disk DNS Ex Configuration Ex Mailbox Ex Public Folder Ex Metrics SP Content SP Activity PerfMON Disk Info Registry Services Patch Check System Info WMI Text Search PowerShell Command Line SmartLog Event Log BlackBerry File System File Access File Activity SP Access Ex PowerShell Active Directory LDAP Group Policy Users & Groups AD Inventory SQL ODBC UNIX VB Script INI File Correlation Conformance Change Detection Rules & Scorecards History & Trending Notification & Alerting Survey Mailbox Public Folder Active Directory File System SharePoint RegistryMail Merge Web-based Dashboards Data ExportBuilt-in Reporting Engine START FINISH DATA COLLECTION 1 ANALYSIS 2 REMEDIATION 3 REPORTING 4 Exchange Data Access Governance Active Directory Systems Governance Automated Solutions
  • STEALTHbits Technologies All About Data. StealthINTERCEPT® ACTIVE DIRECTORY (INCLUDING GROUP POLICY & LDAP) FILE SYSTEM RULES ENGINE Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®) CHANGE MONITORING Who Made the Change? Proactively Prevent Changes Historical Retention for Audit & Compliance REPORTING CHANGE BLOCKING ALERTING Real-time Syslog to SIEM & Event Notification EXCHANGE
  • STEALTHbits Technologies All About Data. StealthINTERCEPT® Product Architecture Block Report ! Alert  SIEM
  • STEALTHbits Technologies All About Data. Logical Product Architecture Permissions & Access Usage Configuration Exchange SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING Active Directory Non-Exchange DataSources STEALTHbits metabase UC Mobility Operating System Databases, & External Feeds
  • STEALTHbits Technologies All About Data. STEALTHbits’ Exchange Solution Set Access  Who has access to what?  Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers  What type of access do they have?  Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships Usage & Clean-up  Who is using what?  Operations & Maintenance  Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)  Security  Mailbox Logons, Permission Changes, Membership Changes Investigation  Productivity Concerns  Is someone close to reaching their mailbox quota?  Is someone receiving too much mail?  Security Concerns  Where are improper permissions applied?  Who has excessive access or membership?  What objects have excessive access or membership?  Who can impersonate another user (Send As)?  Who has Full Mailbox Access to a mailbox?  Who has administrative access to Exchange?  Is someone modifying Exchange configurations?  Operational Concerns  Is someone causing excessive IIS Connections (AS, OWA, OAA)?  Is someone causing excessive Mail-Flow (send/receive)?  Are Delivery Times trending poorly?  Are databases reaching dangerous limits?  Has Exchange configuration drifted?
  • STEALTHbits Technologies All About Data.  Attend a Demo o www.stealthbits.com/events Next Steps  Request a Trial o www.stealthbits.com/trial  Learn More o www.stealthbits.com/resources  Ask Us a Question o www.stealthbits.com/company/contact-us Free Trial! http://www.stealthbits.com/Trial