Google-like IT Security Search vulnerability search – webinar announcement

image

IT Security Search is a Google-like search engine for IT that enables IT administrators and security teams to quickly respond to security incidents and analyze incoming events. The tool’s web interface consolidates disparate IT data from Quest’s many security and compliance solutions into a single console. Quest solutions, in turn, can be a reliable supplier of filtered data to various SIEM systems and even help to reduce the cost of ownership.

We invite you to register for the webinar, which will take place on June 16 at 11 o’clock Moscow time. You will learn about the functionality of the solution, tasks to be solved, integrations and licensing. Under the cut, briefly about the capabilities of IT Security Search. Even if you leave the data after the webinar, we will send you a link.

The tool integrates with other Quest solutions: Change auditor, InTrust, Recovery Manager and Enterprise Reporter. The data received from there is used for full-text search.

In IT Security Search, you can enter the username, workstation, event type, or whatever, and detect related events or configurations. Boolean expressions can be used to form queries. It is convenient to build reports from the query results and send them to interested parties on a schedule.

image

You can also rollback AD changes from the IT Security Search interface. That is, for example, you can restore a user deleted by mistake with all its attributes. This is done through integration with another Quest product – Recovery Manager for Active Directory.

If you would like to try Quest solutions on your infrastructure or get more information about products, leave a request at feedback form on our website or contact in another convenient way

Links to our previous articles

Active Directory Group Policies (GPO): Understanding Why It Is Important And How To Manage Them In GPOAdmin

How to keep yourself and that guy safe as a Microsoft Teams admin

What useful things can be extracted from the logs of a Windows workstation

Access control and security reporting for the Microsoft environment in Quest Enterprise Reporter

Let’s compare tools for auditing changes in Active Directory: Quest Change Auditor and Netwrix Auditor

Sysmon can now write clipboard contents

We enable the collection of events about the launch of suspicious processes in Windows and identify threats using Quest InTrust

How InTrust Can Help Reduce RDP Login Failures

How to reduce the cost of ownership of a SIEM system and why you need Central Log Management (CLM)

We identify a ransomware attack, gain access to a domain controller and try to resist these attacks

Subscribe

Facebook group

Youtube channel

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *