Premium Essay

Nt1330 Unit 3 Assignment 1 Case Study Of Configuration Auditing

Submitted By
Words 900
Pages 4
A closer look at LepideAuditor Suite
Server systems are like pillars to establish the working environment in an organization. These servers should be up all times without any interruptions. If a server crashes or goes down because of an unwanted change, the users will not be able to work. Such problematic changes can be a result of IT Administrator’s trial to test a new policy in a live environment or it can be because of an unwelcome access. In case of the latter, the organization will not only lose valuable time of its professionals, but also there is a chance of an insider’s unexpected access to the million-dollar information stored on the servers.
With change configuration auditing of servers in hand, an IT Administrator is supposed to save the …show more content…
Figure 1: Dashboard Tab
To start with, you have to go to the Settings Tab (Component Management and click “Add” for adding a domain, SharePoint Server or SQL Server. Provide the basic details like name or IP Address of server and login credentials of an administrative user. Once IP Address is identified, you can customize the auditing by selecting objects, object classes, operations, mailbox accesses, site URLs, databases, etc. you want to monitor. You have to provide the details of SQL Server to store the auditing logs at the last step.
Once a server is added, you have to sit back, relax and just keep watching how your server is being monitored and audited by LepideAuditor Suite.

Figure 2: Reports Tab
You can see the reports in three different views – Grid, Graph, and Calendar. Almost every detail about a change will be displayed. For Active Directory and Group Policy, you have the option to rollback an unwanted

Similar Documents

Premium Essay

Test

...Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone...

Words: 2305 - Pages: 10