StealthAUDIT for Unix

Comprehensive Unix Configuration and Security Auditing

Unix and Unix-like Operating Systems (such as Linux) are often selected to support an organization’s most critical computing functions because of the power and control they provide. As a byproduct of their criticality, it’s imperative that Administrators understand how each Unix system is configured, the various roles each plays, and how they’ve been secured.

Request a Free Trial

Powered by ChronoForms - ChronoEngine.com

The Power of StealthAUDIT for Unix

StealthAUDIT for Unix has been preconfigured to provide deep visibility into important Unix concepts including privileged access rights, user and group details, and sharing configurations. Additionally, just like Unix itself, StealthAUDIT provides extensible, flexible controls capable of reaching into any aspect of Unix and its many operating system variants, facilitating and automating any collection, analysis, and reporting task at enterprise-scale.

StealthAUDIT for SQL - 360° Visibility

Privileged Access

Automatically discover and parse all rights granted via sudoers in an audited environment, in addition to identifying the owners of critical files such as password, shadow, sudoers, hosts, deny, and more

StealthAUDIT for SQL - Automated Discovery, Security, & Compliance

Users and Groups

Inventory and analyze User and Group details in an audited environment, highlighting issues including Password Security Settings, “toxic” group conditions such as duplicate, empty, and large groups, and inconsistencies across systems

StealthAUDIT for SQL - Flexible & Extensible

Sharing

Assess and analyze NFS and Samba share configurations for potentially insecure share settings, highlighting and categorizing high, medium, and low risk scenarios through generated reports

Start Auditing Unix

Key Features

  • Preconfigured and Customizable Data Collection SQL Activity Monitoring
  • Secure Credential Management
  • Integrated Analysis and Reporting
  • Alerting and Remediation Instrumentation

Top Use Cases

  • Identify Local Users and Groups
  • Identify Insecure Password Setting Configurations
  • Determine Security of Configured File Shares
  • Determine Ownership of Critical Files
  • Determine Sudo Rights (Privileged Access)

Resources

StealthAUDIT for Unix

Data Sheet

Learn More

Free Risk Assessment
Free Trial Request
STEALTHbits Demo Request
Browse Resource Library