Skip to content

TechRepublic

Trending Now

The modern creative communication and internet network connect in smart city
Image: Blue Planet Studio/Adobe Stock
Article

How to install and use the Portmaster cross-platform network monitor

Envelope with top secret stamp and blank papers.
Image: elnavegante/Adobe Stock
Article

How to create a Docker secret and use it to deploy a service

Remote work with distant employee network in internet tiny person concept
Image: VectorMine/Adobe Stock
Article

The digital workplace requires a transformation in how people think and work

MUNICH, IBM Watson IoT Center and Microsoft Headquater in Munich Germany - May 08, 2018
Image: gguy/Adobe Stock
Article

You can now combine Power Virtual Agents and the Azure Bot Framework Composer

  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
CXO

Spotlight: NetWrix Change Reporter Suite

By Debra Littlejohn Shinder June 15, 2010, 1:31 AM PDT

Image
1
of 6
Previous Next

netwrix-fig1.jpg
netwrix-fig1.jpg
Spotlight: NetWrix Change Reporter Suite

Modular design

Modular design

The NetWrix Change Reporter Suite’s modular design provides a customizable and comprehensive change auditing solution.

For a full review of the NetWrix Change Reporter Suite, check out the TechRepublic Product Spotlight Blog.

Image created by Debra Littlejohn Shinder for TechRepublic.

Spotlight: NetWrix Change Reporter Suite

Flexible management

Flexible management

You can manage a domain, collection of computers, or VMware infrastructure.

For a full review of the NetWrix Change Reporter Suite, check out the TechRepublic Product Spotlight Blog.

Image created by Debra Littlejohn Shinder for TechRepublic.

Spotlight: NetWrix Change Reporter Suite

Choose a database

Choose a database

You can use an existing SQL server or install and automatically configure Microsoft SQL Server 2005 Express Edition for storing the database.

For a full review of the NetWrix Change Reporter Suite, check out the TechRepublic Product Spotlight Blog.

Image created by Debra Littlejohn Shinder for TechRepublic.

Spotlight: NetWrix Change Reporter Suite

Change Reporter

Change Reporter

The Change Reporter Suite modules appear separately in the Start menu.

For a full review of the NetWrix Change Reporter Suite, check out the TechRepublic Product Spotlight Blog.

Image created by Debra Littlejohn Shinder for TechRepublic.

Spotlight: NetWrix Change Reporter Suite

Sample report

Sample report

A sample report showing Active Directory changes.

For a full review of the NetWrix Change Reporter Suite, check out the TechRepublic Product Spotlight Blog.

Image created by Debra Littlejohn Shinder for TechRepublic.

Spotlight: NetWrix Change Reporter Suite

Roll back

Roll back

You can roll back changes to a restore point from the snapshots collected by the Change Reporter module or from Active Directory tombstone.

For a full review of the NetWrix Change Reporter Suite, check out the TechRepublic Product Spotlight Blog.

Image created by Debra Littlejohn Shinder for TechRepublic.

  • CXO
  • Account Information

    Share with Your Friends

    Spotlight: NetWrix Change Reporter Suite

    Your email has been sent

Share: Spotlight: NetWrix Change Reporter Suite
Image of Debra Littlejohn Shinder
By Debra Littlejohn Shinder
DEBRA LITTLEJOHN SHINDER is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security. These include Scene of the Cybercrime: Computer Forensics Handbook, published by Syngr
  • Account Information

    Contact Debra Littlejohn Shinder

    Your message has been sent

  • |
  • See all of Debra Littlejohn's content

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a Security Analyst

    Recruiting a Security Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions and a basic want ad that you can customize for your business to find, interview, recruit and hire the best candidates for a ...

    Downloads
    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 2:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Membership
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice