SlideShare a Scribd company logo
1 of 26
Sharp Tools for
Windows IT Administrators
     Weeks of Work Cut Down To Seconds




                                                        1
                          © 2012 by Lieberman Software Corporation
How much do
you know about
 your Windows
  workstations
  and servers?
                 2
Windows Management Challenges
Can you find and fix the following on ALL
Workstations and Servers in minutes?

   Extra Local                     Bad Registry
   Accounts?                         Entries?

 Inappropriate                     Unauthorized
  Local Group                       Directory
 Memberships?                        Shares?

               Unauthorized NTFS
           File/Directory Permissions?
                                                  3
Windows Management Challenges

 What do you do                Can you check
when IT Auditors             BIOS versions and
  show up and                    hardware
demand reports?               configurations?

Can you check file             Can you check
   versions on                  patches and
    systems?                 installed program?

           Can you push new files out
          and remotely run programs?
                                                  4
Easy to do in
  Minutes
   with…

                5
User Manager Pro Suite
A Powerful Toolbox for IT Administrators

               • Real-Time Interactive
                 Reporting & Remediation

               • Modify groups, users,
                 passwords, registries,
                 policies, audit settings,
                 rights, and more en masse



  Did we mention it’s agent-less?
                                             6
Quick and Easy
Report & Remediate

      Step 1:
  Select Systems
                     7
Select Systems and Report




                            8
Step 2: Pick a Category




                          9
Step 3: Get Real-Time Data
     Accounts Report




                             10
Step 4: Immediately Fix Problems
 From Highlighted Report Data -
      Unauthorized User(s)




                                   11
Fix Bad Group Memberships




                            12
Fix Dangerous Registry Entries:
    Run=, Malware, Viruses




                                  13
See what permissions are assigned,
 such as full control (all) to Susan




 .. and fix the problems right from
       the interactive report!
                                       14
Check Local Event Settings, Space
Remaining, Policies, Audit Flags…




                                    15
BIOS and Baseboard Reports




                             16
Deep Dives in WMI




                    17
Step 5: Sort, View / Export / Email
      Reports Immediately




                                      18
User Manager Pro Suite
 User Management & More…

• Add, Edit, Delete Users, Groups, Members
• Intelligent Removal of “Extra” User Accounts
• Intelligent Group Membership Re-Architecting
• Update Account Flags
• … All that and more – from one dialog


 Apply to every system with just one click!
                                                 19
Mass Management:
Select Systems and Operation




                               20
Single/Bulk User
    Management:
  Add, Remove, or
Intelligently Discard
  Unwanted Users

                        21
22
Single/Bulk Membership
      Management:
Add, Remove, Move, or
  Intelligently Discard
  Unwanted Members

                          23
24
Analyst, Customer Quotes
“This is an excellent tool that all Windows network
administrators should seriously consider adding to their
toolbox.”
- Redmond Magazine


“UMPS is like a Swiss army knife. It has a lot of individual
tools that are very handy. We may be interested in event logs
on a variety of machines or to investigate the presence of
tombstone computer accounts in our domain. Whatever the
case, UMPS diligently pulls the information for us and makes
the changes when and where applicable.”
- Tarrant County College
                                                                25
Next Steps

• Talk to a representative:
  – 310-550-8575 or sales@liebsoft.com

• Try User Manager Pro Suite for FREE
  – www.liebsoft.com/user_manager_pro_download/

• Visit our website to learn more
  – www.liebsoft.com/User_Manager_Pro_Suite


                                                  26

More Related Content

What's hot

The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012jmustac
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.pptb4worker
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentialssolsoft
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshotsNorthernstar
 
computer software (cont.)
computer software (cont.)computer software (cont.)
computer software (cont.)Jelz JZ
 
Security 101: Limiting Powerful User Profiles
Security 101: Limiting Powerful User ProfilesSecurity 101: Limiting Powerful User Profiles
Security 101: Limiting Powerful User ProfilesPrecisely
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijvenICT-Partners
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overviewfannaq786
 

What's hot (13)

The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.ppt
 
Office 2010 migration
Office 2010 migrationOffice 2010 migration
Office 2010 migration
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 
computer software (cont.)
computer software (cont.)computer software (cont.)
computer software (cont.)
 
Security 101: Limiting Powerful User Profiles
Security 101: Limiting Powerful User ProfilesSecurity 101: Limiting Powerful User Profiles
Security 101: Limiting Powerful User Profiles
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijven
 
SoftAge eDMS
SoftAge eDMSSoftAge eDMS
SoftAge eDMS
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 

Viewers also liked

How Managing Privileged Access Reduces the Risk of a Data Breach
How Managing Privileged Access Reduces the Risk of a Data BreachHow Managing Privileged Access Reduces the Risk of a Data Breach
How Managing Privileged Access Reduces the Risk of a Data Breachliebsoft
 
Charla CM Summit
Charla CM SummitCharla CM Summit
Charla CM SummitJoacoco
 
Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240dnz2402012
 
New microsoft office power point presentation (1)
New microsoft office power point presentation (1)New microsoft office power point presentation (1)
New microsoft office power point presentation (1)Sheikh Hassan
 
Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.
Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.
Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.SuDersh AGarwal
 
Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240dnz2402012
 
Dna vaccines powerpoint
Dna vaccines powerpointDna vaccines powerpoint
Dna vaccines powerpointjadetailor
 

Viewers also liked (12)

How Managing Privileged Access Reduces the Risk of a Data Breach
How Managing Privileged Access Reduces the Risk of a Data BreachHow Managing Privileged Access Reduces the Risk of a Data Breach
How Managing Privileged Access Reduces the Risk of a Data Breach
 
Charla CM Summit
Charla CM SummitCharla CM Summit
Charla CM Summit
 
Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240
 
Diabetes and GIT
Diabetes and GITDiabetes and GIT
Diabetes and GIT
 
DIABETES AND GASTROINTESTINAL TRACT
DIABETES AND GASTROINTESTINAL TRACTDIABETES AND GASTROINTESTINAL TRACT
DIABETES AND GASTROINTESTINAL TRACT
 
New microsoft office power point presentation (1)
New microsoft office power point presentation (1)New microsoft office power point presentation (1)
New microsoft office power point presentation (1)
 
Diabetes and GIT
Diabetes and GITDiabetes and GIT
Diabetes and GIT
 
PPI when and where
PPI when and wherePPI when and where
PPI when and where
 
Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.
Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.
Real Numbers,Polynomials,Linear Equation In Two Variables For Class 10th.
 
DIABETES AND GASTROINTESTINAL TRACT
DIABETES AND GASTROINTESTINAL TRACTDIABETES AND GASTROINTESTINAL TRACT
DIABETES AND GASTROINTESTINAL TRACT
 
Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240Звіт керівника ДНЗ №240
Звіт керівника ДНЗ №240
 
Dna vaccines powerpoint
Dna vaccines powerpointDna vaccines powerpoint
Dna vaccines powerpoint
 

Similar to Sharp Tools For Windows IT Administrators

Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.Jane Grafton
 
Mwlug2014 - IBM Connections Security and Migration
Mwlug2014 - IBM Connections Security and MigrationMwlug2014 - IBM Connections Security and Migration
Mwlug2014 - IBM Connections Security and MigrationVictor Toal
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsScriptLogic
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksSpiceworks
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious ServersRaleigh ISSA
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesJeff Stokes
 
Accidentaltechie5 17-2011
Accidentaltechie5 17-2011Accidentaltechie5 17-2011
Accidentaltechie5 17-2011Highway T
 
Take Control of Your Windows Environment
Take Control of Your Windows EnvironmentTake Control of Your Windows Environment
Take Control of Your Windows EnvironmentJane Grafton
 
What the hell is PowerShell?
What the hell is PowerShell?What the hell is PowerShell?
What the hell is PowerShell?NETUserGroupBern
 
15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk PlusLeeben Amirthavasagam
 
OSB190: What's New in Xtraction
OSB190: What's New in XtractionOSB190: What's New in Xtraction
OSB190: What's New in XtractionIvanti
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating SystemsAmber Wheeler
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the networkWiliam Ferraciolli
 
"Remo more" a cloud based device performance product from Remo Software
"Remo more" a cloud based device performance product from Remo Software"Remo more" a cloud based device performance product from Remo Software
"Remo more" a cloud based device performance product from Remo SoftwareGirish Bhimmapa PMP
 
The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)Thomas Krause
 
Nt1310 Unit 5 Administrative Tools
Nt1310 Unit 5 Administrative ToolsNt1310 Unit 5 Administrative Tools
Nt1310 Unit 5 Administrative ToolsJenny Smith
 

Similar to Sharp Tools For Windows IT Administrators (20)

Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.
 
Mwlug2014 - IBM Connections Security and Migration
Mwlug2014 - IBM Connections Security and MigrationMwlug2014 - IBM Connections Security and Migration
Mwlug2014 - IBM Connections Security and Migration
 
Kill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin RightsKill Administrator: Fighting Back Against Admin Rights
Kill Administrator: Fighting Back Against Admin Rights
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
2010-03 Yesterday's Trusted Web Sites are Today's Malicious Servers
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
 
Accidentaltechie5 17-2011
Accidentaltechie5 17-2011Accidentaltechie5 17-2011
Accidentaltechie5 17-2011
 
Take Control of Your Windows Environment
Take Control of Your Windows EnvironmentTake Control of Your Windows Environment
Take Control of Your Windows Environment
 
What the hell is PowerShell?
What the hell is PowerShell?What the hell is PowerShell?
What the hell is PowerShell?
 
15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
OSB190: What's New in Xtraction
OSB190: What's New in XtractionOSB190: What's New in Xtraction
OSB190: What's New in Xtraction
 
Lab 14
Lab 14Lab 14
Lab 14
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
"Remo more" a cloud based device performance product from Remo Software
"Remo more" a cloud based device performance product from Remo Software"Remo more" a cloud based device performance product from Remo Software
"Remo more" a cloud based device performance product from Remo Software
 
The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)The Forgotten Customer (XPDays 2011)
The Forgotten Customer (XPDays 2011)
 
Nt1310 Unit 5 Administrative Tools
Nt1310 Unit 5 Administrative ToolsNt1310 Unit 5 Administrative Tools
Nt1310 Unit 5 Administrative Tools
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Sharp Tools For Windows IT Administrators

  • 1. Sharp Tools for Windows IT Administrators Weeks of Work Cut Down To Seconds 1 © 2012 by Lieberman Software Corporation
  • 2. How much do you know about your Windows workstations and servers? 2
  • 3. Windows Management Challenges Can you find and fix the following on ALL Workstations and Servers in minutes? Extra Local Bad Registry Accounts? Entries? Inappropriate Unauthorized Local Group Directory Memberships? Shares? Unauthorized NTFS File/Directory Permissions? 3
  • 4. Windows Management Challenges What do you do Can you check when IT Auditors BIOS versions and show up and hardware demand reports? configurations? Can you check file Can you check versions on patches and systems? installed program? Can you push new files out and remotely run programs? 4
  • 5. Easy to do in Minutes with… 5
  • 6. User Manager Pro Suite A Powerful Toolbox for IT Administrators • Real-Time Interactive Reporting & Remediation • Modify groups, users, passwords, registries, policies, audit settings, rights, and more en masse Did we mention it’s agent-less? 6
  • 7. Quick and Easy Report & Remediate Step 1: Select Systems 7
  • 9. Step 2: Pick a Category 9
  • 10. Step 3: Get Real-Time Data Accounts Report 10
  • 11. Step 4: Immediately Fix Problems From Highlighted Report Data - Unauthorized User(s) 11
  • 12. Fix Bad Group Memberships 12
  • 13. Fix Dangerous Registry Entries: Run=, Malware, Viruses 13
  • 14. See what permissions are assigned, such as full control (all) to Susan .. and fix the problems right from the interactive report! 14
  • 15. Check Local Event Settings, Space Remaining, Policies, Audit Flags… 15
  • 16. BIOS and Baseboard Reports 16
  • 17. Deep Dives in WMI 17
  • 18. Step 5: Sort, View / Export / Email Reports Immediately 18
  • 19. User Manager Pro Suite User Management & More… • Add, Edit, Delete Users, Groups, Members • Intelligent Removal of “Extra” User Accounts • Intelligent Group Membership Re-Architecting • Update Account Flags • … All that and more – from one dialog Apply to every system with just one click! 19
  • 21. Single/Bulk User Management: Add, Remove, or Intelligently Discard Unwanted Users 21
  • 22. 22
  • 23. Single/Bulk Membership Management: Add, Remove, Move, or Intelligently Discard Unwanted Members 23
  • 24. 24
  • 25. Analyst, Customer Quotes “This is an excellent tool that all Windows network administrators should seriously consider adding to their toolbox.” - Redmond Magazine “UMPS is like a Swiss army knife. It has a lot of individual tools that are very handy. We may be interested in event logs on a variety of machines or to investigate the presence of tombstone computer accounts in our domain. Whatever the case, UMPS diligently pulls the information for us and makes the changes when and where applicable.” - Tarrant County College 25
  • 26. Next Steps • Talk to a representative: – 310-550-8575 or sales@liebsoft.com • Try User Manager Pro Suite for FREE – www.liebsoft.com/user_manager_pro_download/ • Visit our website to learn more – www.liebsoft.com/User_Manager_Pro_Suite 26

Editor's Notes

  1. Highlight and click Get Info
  2. Select a report (Basic Users Report)
  3. Report is generated in real-time in just a minute or two using multi-threading high performance native code.
  4. Any configurations can be immediately remediated by highlighting ALL the offending rows, right click the select the action you want to perform. The change take effect IMMEDIATELY and are logged.Compare this to having to make a group policy change and hoping that it takes effects.Or, having to write a distribution package for System Center and waiting hours or days for it to take effect, if at all.
  5. Immediate reporting of security and policy violations and immediate correction. Try doing that in a group policy (you cannot). Try doing that in System Center (VERY HARD), write a script to intelligently allow selection in a flexible way (forget it).
  6. Imagine being able to collect the registries of all your systems in one place, sort them, find and edit them in a single click.Get rid of rogue programs, check versions, etc.
  7. Note that you can see sizes of logs, % full, retention periods, creation dates (all sortable),This is the data that your auditors have demanded, but you could never put together in one report!
  8. Check if auditing has been disabled or modified. Report on local users rights. Immediately fix non-compliant auditing.
  9. We have incredible deep dive reporting built-into the product
  10. Report data can then be exported in multiple formats (i.e. Excel, HTML, CSV) and can be used immediately or emailed
  11. Group memberships: who is an administrator? How did they get to be an admin? Add users who should be admins and remove everything else that shouldn’t be there.
  12. Apply to all required systems. This sets up the username, password, group memberships all from one screen, across any number of systems.