Data Management

Monitoring Active Directory for Security and Compliance: Bridging the Gaps in the Native Audit Log

Download Now Date Added: Oct 2009
Format: PDF

Much of the security and control of an enterprise IT environment rests on Active Directory. It provides authentication and access control for Windows users and applications, as well as for UNIX, Linux and mainframes. Even VPNs, extranets and internal network security technologies all use Active Directory for policy and identity information.