STEALTHbits Activity Monitor is an internal control that performs the act of validating how data is used, accessed, modified and reported on as part of Data Access Governance activities, the generation of Threat Analytics and the capturing of human and machine activity associated with data and applications.
STEALTHbits Activity Monitor 3.0 quiets the noise of activity logs permitting organizations to efficiently and intelligently record file access activities for security, compliance, and operational purposes. From extended Nansuni support to SharePoint activity monitoring – selective operations filtering to TCP connection for SYSLOG messages, STEALTHbits Activity Monitor 3.0 provides an increased level of operational and security intelligence, allowing analysts to focus only on the events that are important to their specific needs.
SharePoint is a monolithic product that tries to be all things to all people – it is a Web application, but you can also think of it as a collaboration tool, a document server or even a development framework. Not having insight into whether or not objects or security groups have changed, for example, is a major roadblock for organizations. The abstract and highly customizable nature of SharePoint is what makes it tough to secure.
This enhancement to STEALTHbits Activity Monitor offers the ability to scrutinize SharePoint activity by expanding the level of operational and security intelligence that is not available natively.
Regardless of storage platform, organizations need the ability to efficiently and intelligently record file access activities for security, compliance, and operational purposes.
Extending support for Nasuni Storage enables organizations relying on the platform to recognize all the benefits the platform can provide, without sacrificing the visibility they need to safeguard and manage their critical files.
When transporting mission critical data, we want to be sure that data has arrived safely and is delivered in a reliable manner. By using transport protocol (TCP) on the application level, that goal can be achieved.
STEALTHbits Activity Monitor 3.0 can be configured to use a TCP connection when sending Syslog messages to the Syslog Server. TCP ensures a reliable and ordered delivery of activity data, manages message acknowledgment and retransmissions in case of lost parts. Thus there is absolutely no missing data.
STEALTHbits Activity Monitor 3.0 can be configured to selectively capture only the file and folder operations that are of interest. The ability to specifically target activity operations allows analyst to focus only on the events that are important for their specific needs. Selective operations filtering also reduces the number of events forwarded to other systems, including SIEMs, reducing operational cost and increasing efficacy.
Support has been extended to Microsoft 2016 Server. Windows Server 2016 is the cloud-ready operating system that delivers new layers of security for the applications and infrastructure that power your business. STEALTHbits Activity Monitor 3.0 can now support file servers running on MS 2016 Server.
Office Temp files can be a source of noisy events, and can equally contain sensitive data making the monitoring of them necessary for some. STEALTHbits Activity Monitor 3.0 can be configured to filter Office Temp files from monitoring, allowing organizations to decide if they want to supervise these events. Removal of Office Temp files also reduces the number of events forwarded to other systems, including SIEMs, reducing operational cost and increasing efficacy.