As part of STEALTHbits’ comprehensive Data Access Governance suite for structured and unstructured data, StealthAUDIT for SQL automates the process of understanding where SQL databases exist, who has access to them, how they obtained access, who or what is leveraging their access privileges, where sensitive information resides, and how each database has been configured.
With visibility into every corner of Microsoft SQL Server and the Windows Operating System it relies upon, organizations can proactively highlight and prioritize risks to sensitive data. Additionally, organizations can automate manual, time-consuming, and expensive processes associated with compliance, security, and operations to easily adhere to best practices that keep SQL Server safe and operational.
Password strength is an important component of any organization’s overall information security strategy. Weak and default passwords make it exponentially easier for attackers to compromise accounts of all types, however, there are only a limited set of controls provided within Active Directory to prevent users from creating and leveraging weak passwords, even if they do meet strong complexity requirements.
With the ability to identify users leveraging passwords contained in publically available password dictionaries and organizationally-defined unapproved password lists, security personnel can proactively identify users most susceptible to successful brute force or password guessing attacks. Leveraging strong passwords across all accounts effectively mitigates the risk of security breach for the organization as a whole.
Microsoft and others have documented hundreds of ways in which attackers can exploit various conditions, misconfigurations, and the nature by which certain functions operate within Active Directory and Windows to compromise credentials, obtain unauthorized access to network resources, and achieve persistence within the environment.
StealthAUDIT’s catalog of threat reports provide organizations with a method to easily highlight the scenarios and situations they need to prioritize to safeguard their systems and accounts from compromise. As it’s difficult for any organization to keep themselves abreast of and protected from all the different vectors of attack bad actors are leveraging, STEALTHbits’ preconfigured solution eliminates the time needed to research these common threats, along with how to mitigate them via homegrown or 3rd party solutions.
Microsoft Exchange has been and continues to be one of the largest repositories of unstructured data within any organization. Sensitive correspondences, files, and information are all contained within Exchange, making mailboxes a prime target for attackers looking to obtain information that could be valuable and damaging to an organization.
With the ability to now discover where sensitive information exists within an organization’s Exchange environment, security professionals can pinpoint and remediate areas of risk proactively, before compromise occurs or data leaves the organization.
A new Report Viewer role has been created in StealthAUDIT to allow users to view the Report Index and individual reports. Report Viewers are able to view specific reports based on Active Directory User or Group assignments, designated at the root, job group, individual job, and report level.
Users can leverage StealthAUDIT’s built-in password vault or an encrypted text file to store credentials and account information, Admins can view which users can view each report, and protections apply to both the Published Reports website and node within the StealthAUDIT console.
Certain audit routines like file-level permission scanning and the discovery of sensitive data can take longer periods of time to complete, resulting in periods of delay before the data can be viewed and analyzed.
With the ability to now automatically stream the results collected during file system permissions, DFS, and sensitive data discovery scans to StealthAUDIT’s database, users can immediately begin reviewing and analyzing results, expediting remediation and reporting efforts.