Detect suspicious changes to databases in your SQL Server to prevent system unavailability or compromise of sensitive data.
Full access permissions should be continuously monitored to minimize the risk of security breaches.
Auditing of both failed and successful logon attempts is extremely important because it helps IT pros detect malicious activity before a data breach occurs.
Learn how to count the number of files in a folder with PowerShell and how to automate this process with Netwrix Auditor. The PowerShell script on this page shows you how many files are stored in a specific directory.
Learn how to create a PowerShell script to manually monitor a folder for new and updated files, and see how you can streamline the process with Netwrix Auditor.
Learn how to create and use PowerShell script to get ACL for a folder and export report on share permissions.
Learn how to get an NTFS permissions report in a few simple steps to ensure your files are secured properly.
See how you can find account lockout source and the underlying reason using a PowerShell script or Netwrix Auditor.
Get a report about Active Directory user login history with a PowerShell script or Netwrix Auditor. Review both remote and local logons with time and system details.
Learn how you can monitor AD group membership changes with native auditing capabilities in Windows Server and with Netwrix Auditor.
Struggling to get a list of AD OU members? Learn how you can produce a list of all AD users in an OU, with and without PowerShell scripting.
Learn how you can use PowerShell to list all computers in an OU
Learn how to use PowerShell’s Get-ADUser to find users with Password Never Expires
Learn how you can export a list of computers from AD into various formats, including csv and Excel.
Export NTFS permissions to stay on top of who has what folder security permissions in your organization and how that access was granted
Check SQL permission changes and determine who altered view permissions without running any queries and minimize the risk of data exposure.
Track and investigate changes to the login password in SQL Server to prevent account compromise and better secure your critical assets.
Get a list of users in local groups on Windows machines without having to use the command line on each machine or scripting in PowerShell.
Collect system inventory without wasting your time on PowerShell scripting and get details such as OS installed on each server, OS version and antivirus status.
Spot unnecessary excessive rights and prevent privilege abuse by regularly viewing Active Directory OU Permissions report.
Regularly view shared folders reports to get a list of all file shares and identify non-default shares that can jeopardize your data security.
To mitigate the risk of privilege abuse and pass audits, you need to know how to check user permissions in Active Directory and get a detailed report.
Enforce good access hygiene by staying on top of local administrators’ group membership. Get a report to identify users whose local access rights violate your baseline.
Enable file server permission change audit across your Windows servers to track changes to file, folder and share permissions.
IT pros need to review which groups specific user accounts belong to so they can enforce the least privilege principle in their IT environments.
This how-to shows how to determine who changed permissions to public folders in Exchange Online, so you can improve your sensitive information security.
This how-to shows two ways of detecting who has access to what data on Windows file server.
Create a SQL Server audit trigger for INSERT or UPDATE events and gain visibility into activity across your tables to secure sensitive data.
Create a logon trigger on SQL Server to secure your critical assets. Use the SQL Server logon trigger to audit access events and spot illicit activity faster.
Improper deletion of a GPO can greatly damage the security of your environment. Monitor GPO deletions to facilitate quick recovery and reduce risk of data exposure.
Constant monitoring of file and folder deletions is necessary to prevent business disruptions and data loss through quick restoration of data.
Ongoing review of shared mailbox access events is needed to ensure that no critical business data is exposed or lost because of improper handling of emails.
Group Policy settings export with native tools can be a real challenge. But the right software can simplify exporting of Group Policy settings into an easy-to-read report
Suspicious changes to Startup Registry keys can be a sign of malware activity. Timely detection of these changes can prevent loss of sensitive data.
Constant monitoring of recently enabled accounts enables you to determine who is trying to get unauthorized access to your systems and quickly remediate the issue.
Detect details of GP modifications using Group Policy-related log events. Monitoring of Group Policy logging information helps track aberrant activity.
This how-to shows two ways of detecting who created a new scheduled task on your windows server.
Restore Active Directory objects to ensure system availability. Plus, quickly recover deleted AD user accounts and other objects to a previous state without any downtime.
Ongoing audit of each user’s last logon date in Active Directory helps IT pros detect inactive accounts that can be used as back doors by attackers.
Keeping track of failed Oracle Database logon attempts helps IT administrators detect database intrusion attempts.
By sending automatic notifications to users to change their passwords, IT administrators can ensure IT security and reduce helpdesk workload.
Because IT admins are often asked to export Active Directory to CSV files, having a solution that can quickly export Active Directory objects can save them time.
Exporting users from Active Directory with native tools requires time and effort. The right solution enables you to quickly export Active Directory users to CSV.
An Active Directory group membership report shows the members of a particular group. To have this data at hand in a readable format, simply export AD group members to CSV.
Ongoing monitoring of deleted users in Azure Active Directory minimizes the risk of users losing access to systems they need, thus reducing the number of helpdesk requests.
Constantly reviewing which accounts were unlocked and by whom enables IT admins to spot suspicious account lockouts and respond quickly to protect systems and data.
Continuous monitoring of changes to security permissions to an OU enables IT admins to minimize the risk of unauthorized access to IT systems.
Carefully monitoring all user account deletions enables IT pros to minimize the risk of business disruption and system unavailability.
Continuous review of attempts to modify sensitive files helps you quickly spot suspicious activity to prevent a possible threat before a breach occurs.
Keeping an eye on who reads files on file servers enables IT pros to control access to sensitive data and minimize the risk of information security attacks.
Regular review of permissions helps IT administrators optimize access control and lock down overexposed data to minimize the risk of a security breach.
Determining who deleted a file on your SharePoint site can help you investigate unsanctioned action and appropriately respond to it.
Video recording of user screen activity enables IT administrators to gain visibility into IT systems and control privileged user activity before a security breach occurs.
Regular review of permissions helps IT administrators optimize access control and lock down overexposed data.
Ongoing tracking of SharePoint permission changes helps IT administrators detect unauthorized changes so they can quickly roll them back and minimize their consequences.
IT administrators need to monitor deletions of DHCP reservations to ensure no unauthorized changes took place, thus preventing system unavailability.
Continuous monitoring of DNS record deletions helps IT administrators detect abnormal actions in a timely manner and thereby avoid service unavailability.
Ongoing tracking of deleted computer accounts by IT administrators is important to avoid authentication errors and lost productivity.
Every change of a file owner should be tracked by IT admins to secure sensitive data against leaks and unauthorized access and modifications.
To prevent a data breach, it’s critical to ensure that only authorized users are added to the Domain Admins group and thereby get access to critical data.
IT pros need to continually monitor non-owner access to any shared mailbox in Office 365 to ensure data security and minimize risks of data leaks.
Continuous monitoring of mailbox permissions in Exchange Online enables the timely detection of unauthorized changes, thereby mitigating the risk of security breaches.
To detect unauthorized software installation, IT pros need to monitor all changes made to server configuration and timely get alerted on them.
Ongoing tracking of changes to Active Directory organizational units and groups can help you avoid system downtime, business disruption and loss of productivity.
IT pros need to timely detect suspicious file changes to quickly get actionable details for security investigations and spot malicious activity at early stages.
Timely detection of password change and password reset in Active Directory enables IT pros to investigate suspicious activity and avoid data leaks and system downtime.
The ability to quickly detect a disabled user in Active Directory and identify who disabled the account enables IT Pros to investigate the root cause of suspicious activity.
To thwart attackers, IT pros must be able to continuously audit changes in the environment and quickly determine who created AD user accounts.
Detecting AD user account changes using native auditing is time-consuming. Netwrix Auditor for Active Directory monitors these changes helping you quickly detect intruders.