+1-800-492-3951 or +3188.8.131.52.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Specific accounts can be created for people without administrative rights allowing external auditors or non-IT users to perform audits securely and autonomously.
Hi everyone, welcome to the FileAudit Tutorial. Let’s see here how to implement the FileAudit Delegation for non IT users. Non-IT executives or external auditors need to use and evaluate file access-related data. FileAudit offers all features by granting them access with appropriate rights so as not to consume valuable IT staff’s time.
Three quick steps are required. The first one consists of enabling the remote connection to FileAudit. Go to the “Settings” tile and open the “Service” section. Just switch on the remote connections. By default the Communication port that will be used is 2000. You can define here a different port if you want. As warned, any modification of these specific service options requires a FileAudit service restart. Now to validate the settings, go back to the FileAudit hub and close the FileAudit console. Then open the Windows services console and restart the FileAudit service.
The second step is to create accounts that are authorized to access FileAudit and their specific privileges. Click on the “Permissions” section. Click the “Add a user” button and enter the desired name through the Microsoft account selector. Check the entered name. And once the user name is detected and validated, click “OK”. Next you’ll be able to choose what permissions you want to give to this specific user or group. There are 5 feature sets: “Audit” grants access to the File Access viewer, “Configure Audit” allows you to delegate the management of the Audited path. The next permits you to give access to the reports and alerts configuration. “Configure settings” concerns all FileAudit options except the permissions which is the subject of the last switch. If the goal is to delegate only the File access events display, just enable the first switch. You can of course create as many accounts as are needed. We have now set FileAudit for remote use and defined the accounts authorized to connect to it with their appropriate rights.
The last thing to do is to install FileAudit for the user you want to give the audit access. Launch the installation package of FileAudit onto the desired workstation. Every installation step is the same as described for the FileAudit installation tutorial until the “Setup type” step. Switch to a Custom installation. In “Custom Setup”, remove the “Service” feature and click Next. Only the FileAudit console will be installed. Validate the installation to finish the process.
Once the console is installed and open, click on the “Connect” button. The Connect panel will open on the right-hand side. Activate the “Use a remote FileAudit service”, enter the name of the system hosting the target FileAudit service and specify the required port if previously personalized. Otherwise default to 2000. Click “Validate”. These settings will now be kept in memory for the next use. FileAudit is now ready for a remote use. The feature access will be those authorized for the Windows account running the FileAudit console. This is the best way to delegate the audit access to a user without restricting FileAudit features and protecting the administrative privilege on the file server.
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.