Introducing Netwrix Auditor 9.0

Shield Your IT Environment from Ransomware and Malicious Insiders

Stay on top of aberrant behavior to ensure immediate response to external attacks and insider threats.
Protect your network infrastructure against attackers by controlling activity around your Cisco devices.
Grant various IT and business teams exactly the right level of access to security intelligence and settings.
Slash preparation time for GDPR, CJIS and other audits with reports mapped to specific requirements.
Image

Alerts on Threat Patterns

Enable immediate response to ransomware and aberrant insider activity

Safeguard your data against ransomware with instant threshold-based alerting on file server activity. Ensure fast response to other external attacks as well as insider threats by staying on top of suspicious behavior patterns and security violations across your Active Directory, file servers, SharePoint, SQL databases and more. Simply choose from a list of predefined alerts or use the flexible criteria to specify your own pattern of behavior that you consider risky.
Image

A user has just modified a hundred files within a minute — could that be ransomware in progress?

Take action immediately to prevent the ransomware from spreading.

Image
Image

A user has just modified a hundred files within a minute — could that be ransomware in progress?

Take action immediately to prevent the ransomware from spreading.

Image

There’s a spike in failed logons above your usual baseline?

Determine the source IP right away and block it to stop the brute-force attack.

Image
Image

There’s a spike in failed logons above your usual baseline?

Determine the source IP right away and block it to stop the brute-force attack.

Image

There’s a change in a critical database no one is supposed to touch?

Fix it before it leads to a data breach or a critical mistake based on erroneous data.

Image
Image

There’s a change in a critical database no one is supposed to touch?

Fix it before it leads to a data breach or a critical mistake based on erroneous data.

Image

A member of the design team has just accessed an Accounting folder?

It’s time for a serious talk.

Image
Image

A member of the design team has just accessed an Accounting folder?

It’s time for a serious talk.

Image

An AD admin has just logged on to a production database?

He’d better have a ticket for that.

Image
Image

An AD admin has just logged on to a production database?

He’d better have a ticket for that.

Image
Add-on for Cisco

Identify and block threats to your network infrastructure

Gain pervasive visibility into the activity around your network devices, which is normally minimal, so you can spot any outliers and prevent malicious actors from taking control over your traffic. With the free Netwrix Auditor Add-on for Cisco, you can now minimize the risk of network sniffing and other nefarious attacks aimed at monitoring or manipulating the traffic to and from your network, or masking illegitimate access to your critical systems.
Download My Free Add-on
Image
Role-based Access Control

Granularly restrict access to security intelligence

Establish and enforce segregation of duties and a least-privilege model, as recommended by industry best practices and required by many security regulations. Intuitive, fine-grained controls enable you to easily ensure that your various IT and business teams have exactly the right access to Netwrix Auditor’s security intelligence and settings.

  • Configure Active Directory and file server auditing
  • Examine all account lockouts
  • Be notified about SQL Server configuration changes
  • Receive alerts on anomalous file deletions
  • Receive alerts on anomalous file deletions
  • Review activity occurring outside business hours
  • Oversee temporary accounts in privileged groups
Image
Out-of-the-box Compliance Reports

Slash preparation time for audits by 50% or more

Relieve the burden of compliance and impress the auditors during your next check with out-of-the-box reports aligned with compliance controls. Netwrix Auditor now provides out-of-the-box compliance reports mapped to the specific requirements of GDPR, CJIS, FERPA, NERC CIP and GLBA, in addition to the common regulatory standards supported earlier.

Learn more about 30+ enhancements that improve usability, performance and scalability.

See the full list of Netwrix Auditor advantages and learn more about rapid detection and response to ransomware, aberrant insider behavior and other security threats.
Download New Datasheet (.pdf)