What we do really well Help you understand Usage Access Configuration Automate the collection, analysis & reporting of the data you need to see every day Instantiating workflows to remediate certain conditions like object staleness and access Fulfill ad-hoc requirements – Alleviating the need to script, analyze data manually, and piece things together using multiple toolsets Instantiate and enforce policies that prevent particular events from happening
….and doing this at the largest scales
What we’re not We’re not a black box – we’re a platform We’re not a brainless reporting solution for metrics and mailbox sizes We’re not a Diagnostic tool
Engage with us Go to our website to learn more Request a Trial of what it is that we spoke about today
STEALTHbits Solutions for Exchange
STEALTHbits Technologies, Inc.
Exchange Management Solutions
All About Data. Why Go With STEALTHbits?
For over a decade, STEALTHbits
has been a trusted partner to
the world’s largest organizations,
and some of the smallest too.
STEALTHbits is a “roll up our sleeves”
organization that gets the job done –
an important trait in difficult times when
the stakes have never been higher.
300+ clients across
5 out of the top 6
biggest names in
Retention Rate 65% Techs
All About Data.
Deep-level auditing, reporting, and remediation workflows for
Exchange and Exchange-related infrastructure
STEALTHbits’ Exchange Product Portfolio
Real-time monitoring and prevention of change and access for
Exchange and Active Directory
All About Data. StealthAUDIT® Management Platform
Groups | Users | Computers
CENTRALIZED RESOURCE MANAGEMENT
DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING
35+ Data Collection Sources
Extensible Framework, Easy Additions
SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE
AD EX FS SP SQL OS MOB
Ex Public Folder
Users & Groups
Rules & Scorecards
Survey Mailbox Public Folder
File System SharePoint RegistryMail Merge
Web-based Dashboards Data ExportBuilt-in Reporting Engine
All About Data. StealthINTERCEPT®
(INCLUDING GROUP POLICY & LDAP)
Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®)
Who Made the Change? Proactively Prevent Changes
Historical Retention for Audit & Compliance
Real-time Syslog to SIEM & Event Notification
All About Data. StealthINTERCEPT® Product Architecture
All About Data. Logical Product Architecture
SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING
All About Data. STEALTHbits’ Exchange Solution Set
Access Who has access to what?
Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers
What type of access do they have?
Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships
Who is using what?
Operations & Maintenance
Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)
Mailbox Logons, Permission Changes, Membership Changes
Investigation Productivity Concerns
Is someone close to reaching their mailbox quota?
Is someone receiving too much mail?
Where are improper permissions applied?
Who has excessive access or membership?
What objects have excessive access or membership?
Who can impersonate another user (Send As)?
Who has Full Mailbox Access to a mailbox?
Who has administrative access to Exchange?
Is someone modifying Exchange configurations?
Is someone causing excessive IIS Connections
(AS, OWA, OAA)?
Is someone causing excessive Mail-Flow
Are Delivery Times trending poorly?
Are databases reaching dangerous limits?
Has Exchange configuration drifted?
All About Data.
Attend a Demo
Request a Trial
Ask Us a Question