Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

STEALTHbits Solutions for Exchange

949 views

Published on

A brief presentation that gives a general overview of the STEALTHbits solutions that allow your organization to audit, report, monitor, prevent, and remediate changes within Exchange.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

STEALTHbits Solutions for Exchange

  1. 1. STEALTHbits Technologies, Inc. Exchange Management Solutions
  2. 2. STEALTHbits Technologies All About Data. Why Go With STEALTHbits? For over a decade, STEALTHbits has been a trusted partner to the world’s largest organizations, and some of the smallest too. STEALTHbits is a “roll up our sleeves” organization that gets the job done – an important trait in difficult times when the stakes have never been higher. 300+ clients across 5 continents 5 out of the top 6 Global Financials OEM’ed by Gartner’s Leading IAM platforms Integrated w/ biggest names in technology 96% Customer Retention Rate 65% Techs Self-funded since day 1
  3. 3. STEALTHbits Technologies All About Data.  Deep-level auditing, reporting, and remediation workflows for Exchange and Exchange-related infrastructure  Agent-less  On-premise STEALTHbits’ Exchange Product Portfolio  Real-time monitoring and prevention of change and access for Exchange and Active Directory  Agent-based  On-premise
  4. 4. STEALTHbits Technologies All About Data. StealthAUDIT® Management Platform MESSAGING EXCHANGE Groups | Users | Computers CENTRALIZED RESOURCE MANAGEMENT DATA COLLECTION DATA ANALYSIS CHANGE REMEDIATION REPORTING 35+ Data Collection Sources Agentless/Applet/Driver Architecture Extensible Framework, Easy Additions Correlate Conformance Notification Change Rules/Scorecard History/Trends Communicate Add Workflow Automate Modify Delete Static Dynamic Interactive SYSTEMS GOVERNANCE DATA ACCESS GOVERNANCE SHAREPOINT FILE SYSTEM SQL DESKTOPS SERVERSMOBILITY LYNC DIRECTORY SERVICES LDAP ACTIVE DIRECTORY
  5. 5. AD EX FS SP SQL OS MOB Private Store Public Store Metabase Tracking Logs Logs Databases Devices Infrastructure Users Groups Policies Schema Permissions Shares Files Event Logs Farms Sites Folders Lists Permissions Tables Instances Event Logs Services Event Logs WMI System/Disk DNS Ex Configuration Ex Mailbox Ex Public Folder Ex Metrics SP Content SP Activity PerfMON Disk Info Registry Services Patch Check System Info WMI Text Search PowerShell Command Line SmartLog Event Log BlackBerry File System File Access File Activity SP Access Ex PowerShell Active Directory LDAP Group Policy Users & Groups AD Inventory SQL ODBC UNIX VB Script INI File Correlation Conformance Change Detection Rules & Scorecards History & Trending Notification & Alerting Survey Mailbox Public Folder Active Directory File System SharePoint RegistryMail Merge Web-based Dashboards Data ExportBuilt-in Reporting Engine START FINISH DATA COLLECTION 1 ANALYSIS 2 REMEDIATION 3 REPORTING 4 Exchange Data Access Governance Active Directory Systems Governance Automated Solutions
  6. 6. STEALTHbits Technologies All About Data. StealthINTERCEPT® ACTIVE DIRECTORY (INCLUDING GROUP POLICY & LDAP) FILE SYSTEM RULES ENGINE Configure Monitoring/Blocking/Archiving/Alerting Conditions (Who? What? Where? When?®) CHANGE MONITORING Who Made the Change? Proactively Prevent Changes Historical Retention for Audit & Compliance REPORTING CHANGE BLOCKING ALERTING Real-time Syslog to SIEM & Event Notification EXCHANGE
  7. 7. STEALTHbits Technologies All About Data. StealthINTERCEPT® Product Architecture Block Report ! Alert  SIEM
  8. 8. STEALTHbits Technologies All About Data. Logical Product Architecture Permissions & Access Usage Configuration Exchange SURVEY WORKFLOWS OPEN DATA VIEWSPRECONFIGURED & CUSTOM REPORT AUTHORING Active Directory Non-Exchange DataSources STEALTHbits metabase UC Mobility Operating System Databases, & External Feeds
  9. 9. STEALTHbits Technologies All About Data. STEALTHbits’ Exchange Solution Set Access  Who has access to what?  Mailboxes, Public Folders, Distribution Lists, .PSTs, Exchange Servers  What type of access do they have?  Administrative, Delegate & SendAs, Permissions (Editor, Reviewer, Owner, etc.), Memberships Usage & Clean-up  Who is using what?  Operations & Maintenance  Stale Objects (Public Folders, Mailboxes, Distribution Lists, .PSTs, Devices)  Security  Mailbox Logons, Permission Changes, Membership Changes Investigation  Productivity Concerns  Is someone close to reaching their mailbox quota?  Is someone receiving too much mail?  Security Concerns  Where are improper permissions applied?  Who has excessive access or membership?  What objects have excessive access or membership?  Who can impersonate another user (Send As)?  Who has Full Mailbox Access to a mailbox?  Who has administrative access to Exchange?  Is someone modifying Exchange configurations?  Operational Concerns  Is someone causing excessive IIS Connections (AS, OWA, OAA)?  Is someone causing excessive Mail-Flow (send/receive)?  Are Delivery Times trending poorly?  Are databases reaching dangerous limits?  Has Exchange configuration drifted?
  10. 10. STEALTHbits Technologies All About Data.  Attend a Demo o www.stealthbits.com/events Next Steps  Request a Trial o www.stealthbits.com/trial  Learn More o www.stealthbits.com/resources  Ask Us a Question o www.stealthbits.com/company/contact-us Free Trial! http://www.stealthbits.com/Trial

×