


Netwrix Auditor 9.7
Detect and Block Attacks
on Your Network Devices

targeting
Cisco and Fortinet
network devices
and minimize
overexposed data
in SharePoint
for Network Devices
Stay updated on what’s
going on with your
network devices
Reduce the risk of attackers taking control of your critical network infrastructure
or insiders
inadvertently or deliberately jeopardizing its security. Quickly catch
whenever someone is trying
to log into Cisco or Fortinet devices and detect activity
aimed
at monitoring or manipulating
the traffic to and from your network, or masking
illegitimate
access to your critical systems.
Reduce the risk of attackers taking control of your critical network infrastructure or insiders inadvertently or deliberately jeopardizing its security. Quickly catch whenever someone is trying to log into Cisco or Fortinet devices and detect activity aimed at monitoring or manipulating the traffic to and from your network, or masking illegitimate access to your critical systems.

network devices directly or via VPN, as well as suspicious changes
that could jeopardize the security of your network.

such as PCI DSS, NIST and CIS Critical Security Controls by monitoring and controlling changes to the configurations of your network devices.


network devices directly or via VPN, as well as suspicious changes
that could jeopardize the security of your network.

SharePoint Permissions
Discover who has access to what
on your SharePoint
See through the tangled SharePoint permissions layout and get a clear picture
of which users have
what permissions to what data. Netwrix Auditor enables you to
proactively
mitigate the risk of insider
misuse and reduce the reach of compromised
accounts by
streamlining the process of conducting
regular privilege attestations.
See through the tangled SharePoint permissions layout and get a clear picture of which users have what permissions to what data. Netwrix Auditor enables you to proactively mitigate the risk of insider misuse and reduce the reach of compromised accounts by streamlining the process of conducting regular privilege attestations.
broken inheritance to create a more manageable
SharePoint environment.

data to ensure they are aligned with their
responsibilities: no more, no less.

sensitive data. Ensure that these documents
are not needlessly overexposed.

broken inheritance to create a more manageable
SharePoint environment.

data to ensure they are aligned with their
responsibilities: no more, no less.

Immediately access
account details
to accelerate investigations
Quickly determine whether there were legitimate reasons for activity you deem
suspicious with key
details about each suspect, including their full name, job title,
manager and AD group membership.
This user profile is available side by side
with the suspect’s activity
trail, enabling you to speed
investigations
and make more informed response decisions.
Quickly determine whether there were legitimate reasons for activity you deem suspicious with key details about each suspect, including their full name, job title, manager and AD group membership. This user profile is available side by side with the suspect’s activity trail, enabling you to speed investigations and make more informed response decisions.


what’s going on.


what’s going on.
in AD. Was it legit?

financial files. Should you be concerned?

in AD. Was it legit?

financial files. Should you be concerned?

Dive into the context of any anomalous
user action to understand it fully, so you
can determine how to respond.

Detect and prioritize incidents better with
a single view of all anomalous actions by
a given user and the associated risk score.

Dive into the context of any anomalous
user action to understand it fully, so you
can determine how to respond.

Detect and prioritize incidents better with
a single view of all anomalous actions by
a given user and the associated risk score.

Respond to incidents in seconds, not days
Speed threat mitigation and improve IT team productivity by having Netwrix
Auditor alerts
automatically trigger custom scripts. Use your deep knowledge of your
organization’s policies and
use cases to craft the best response for each type
of incident. Your
only limit is your scripting genius.
Speed threat mitigation and improve IT team productivity by having Netwrix Auditor alerts automatically trigger custom scripts. Use your deep knowledge of your organization’s policies and use cases to craft the best response for each type of incident. Your only limit is your scripting genius.
locked out due to high number
of failed logons.

to form your automatiс response.
been launched on the main
domain controller.

to form your automatiс response.
added to a privileged
AD group.

to form your automatiс response.
of documents on a file share
in less than one minute.

You're all set to automate responses
to alerts in Netwrix Auditor.




You're all set to automate responses
to alerts in Netwrix Auditor.
performance and stability


What’s New in
Netwrix Auditor 9.7
Watch this exclusive webinar to learn how the latest version of the product
empowers you to strengthen network security and speed
incident investigation
and response.