|
1 |
| -# Access Analyzer |
| 1 | +--- |
| 2 | +title: "Netwrix Access Analyzer (formerly Enterprise Auditor) v12.0 Documentation" |
| 3 | +description: "Netwrix Access Analyzer (formerly Enterprise Auditor) v12.0 Documentation" |
| 4 | +sidebar_position: 1 |
| 5 | +--- |
| 6 | + |
| 7 | +# Netwrix Access Analyzer (formerly Enterprise Auditor) v12.0 Documentation |
| 8 | + |
| 9 | +Netwrix Access Analyzer (formerly Enterprise Auditor) automates the collection and analysis of the |
| 10 | +data you need to answer the most difficult questions you face in the management and security of |
| 11 | +dozens of critical IT assets, including data, directories, and systems. |
| 12 | + |
| 13 | +The platform framework contains the following key components: |
| 14 | + |
| 15 | +- Data Collection through Data Collectors |
| 16 | +- Analysis through Analysis Modules |
| 17 | +- Remediation through Action Modules |
| 18 | +- Reporting through Published Reports and the Web Console |
| 19 | + |
| 20 | +Access Analyzer contains over 40 built-in data collection modules covering both on-premises and |
| 21 | +cloud-based platforms from Operating Systems to Office 365. Leveraging an agentless architectural |
| 22 | +approach, our proprietary AnyData collector provides an easy, wizard-driven interface for |
| 23 | +configuring the application to collect exactly the data needed, enabling fast, flawless, |
| 24 | +lightest-weight possible data collection from dozens of data sources. |
| 25 | + |
| 26 | +## Instant Solutions Overview |
| 27 | + |
| 28 | +There are several predefined instant solutions available with Access Analyzer. Each solution |
| 29 | +contains specific data collectors, jobs, analysis modules, action modules, and pre-created reports. |
| 30 | +A few solutions are core components available to all Access Analyzer users, but most solutions |
| 31 | +require a license. |
| 32 | + |
| 33 | +### .Active Directory Inventory Solution |
| 34 | + |
| 35 | +The .Active Directory Inventory Solution is designed to provide essential user, group membership, |
| 36 | +and computer details from the targeted domains to many Access Analyzer built-in solutions. Key |
| 37 | +information includes user status, user attributes, and group membership. The collected data is |
| 38 | +accessed by other Access Analyzer solutions and the Netwrix Access Information Center for analysis. |
| 39 | + |
| 40 | +This is a core solution available to all Access Analyzer users. |
| 41 | + |
| 42 | +See the [.Active Directory Inventory Solution](/docs/accessanalyzer/12.0/solutions/activedirectoryinventory/overview.md) topic |
| 43 | +for additional information. |
| 44 | + |
| 45 | +### .Entra ID Inventory Solution |
| 46 | + |
| 47 | +The .Entra ID Inventory Solution is designed to inventory, analyze, and report on Microsoft Entra |
| 48 | +ID. It provides essential user and group membership details to the Entra ID Solution. Key |
| 49 | +information includes managers, email addresses, and direct memberships. Collected data helps an |
| 50 | +organization identify toxic conditions like nested groups, circular nesting, disabled users, and |
| 51 | +duplicate groups. The user and group information assists with understanding probable group |
| 52 | +ownership, group memberships, largest groups, user status, attribute completion, and synchronization |
| 53 | +status between on-premises Active Directory and Microsoft Entra ID. |
| 54 | + |
| 55 | +This solution also provides information on Microsoft Entra roles. This includes role definitions, |
| 56 | +role assignments, security principals, scope (management groups, subscriptions, and resources), and |
| 57 | +effective role permissions. |
| 58 | + |
| 59 | +This is a core solution available to all Access Analyzer users. |
| 60 | + |
| 61 | +See the [.Entra ID Inventory Solution](/docs/accessanalyzer/12.0/solutions/entraidinventory/overview.md) topic for additional |
| 62 | +information. |
| 63 | + |
| 64 | +### .NIS Inventory Solution |
| 65 | + |
| 66 | +The .NIS Inventory Solution is designed to provide essential user and group membership information |
| 67 | +from a NIS domain, mapping these principals to Windows-style SIDs. This provides valuable |
| 68 | +information to the File Systems Solution when auditing NFS shares. |
| 69 | + |
| 70 | +This is a core solution available to all Access Analyzer users. |
| 71 | + |
| 72 | +See the [.NIS Inventory Solution](/docs/accessanalyzer/12.0/solutions/nisinventory/overview.md) topic for additional |
| 73 | +information. |
| 74 | + |
| 75 | +### Active Directory Solution |
| 76 | + |
| 77 | +The Active Directory Solution is designed to provide the information every administrator needs |
| 78 | +regarding Active Directory configuration, operational management, troubleshooting, analyzing |
| 79 | +effective permissions, and tracking who is making what changes within your organization. |
| 80 | + |
| 81 | +See the [Active Directory Solution](/docs/accessanalyzer/12.0/solutions/activedirectory/overview.md) topic for additional |
| 82 | +information. |
| 83 | + |
| 84 | +### Active Directory Permissions Analyzer Solution |
| 85 | + |
| 86 | +The Active Directory Permissions Analyzer Solution is designed to easily and automatically determine |
| 87 | +effective permissions applied to any and all Active Directory objects, at any scope, allowing for |
| 88 | +the most authoritative view available of who has access to what in Active Directory. |
| 89 | + |
| 90 | +See the |
| 91 | +[Active Directory Permissions Analyzer Solution](/docs/accessanalyzer/12.0/solutions/activedirectorypermissionsanalyzer/overview.md) |
| 92 | +topic for additional information. |
| 93 | + |
| 94 | +### Amazon Web Services Solution |
| 95 | + |
| 96 | +Access Analyzer for AWS allows organizations to secure their data residing in Amazon Web Services |
| 97 | +(AWS) S3 platform, reducing their risk exposure through proactive, automated auditing and reporting |
| 98 | +of S3 permissions, sensitive data, and ultimately a consolidated view of user access rights across |
| 99 | +dozens of structured and unstructured data resources both on-premises and in the cloud. |
| 100 | + |
| 101 | +See the [AWS Solution](/docs/accessanalyzer/12.0/solutions/aws/overview.md) topic for additional information. |
| 102 | + |
| 103 | +### Entra ID Solution |
| 104 | + |
| 105 | +The Entra ID Solution is a comprehensive set of audit jobs and reports that provide the information |
| 106 | +regarding Microsoft Entra ID configuration, operational management, and troubleshooting. The jobs |
| 107 | +within this group help pinpoint potential areas of administrative and security concerns related to |
| 108 | +Microsoft Entra ID users and groups, including syncing with on-premises Active Directory. |
| 109 | + |
| 110 | +See the [Entra ID Solution](/docs/accessanalyzer/12.0/solutions/entraid/overview.md) topic for additional information. |
| 111 | + |
| 112 | +### Box Solution |
| 113 | + |
| 114 | +The Box solution set contains jobs to provide visibility into Box access rights, policies, |
| 115 | +configurations, activities, and more, ensuring you never lose sight or control of your critical |
| 116 | +assets residing in Box. |
| 117 | + |
| 118 | +See the [Box Solution](/docs/accessanalyzer/12.0/solutions/box/overview.md) topic for additional information. |
| 119 | + |
| 120 | +### Databases Solutions |
| 121 | + |
| 122 | +Access Analyzer Databases Solution Set is a comprehensive set of pre-configured audit jobs and |
| 123 | +reports that provide visibility into various aspects of supported databases. |
| 124 | + |
| 125 | +- Azure SQL – The Azure SQL Solution Set is a comprehensive set of pre-configured audit jobs and |
| 126 | + reports that provide visibility into various aspects of Azure SQL : Users and Roles, Sensitive |
| 127 | + Data Discovery, Object Permissions, Configuration, and User Activity. |
| 128 | +- Db2 – The Db2 Solution Set is a comprehensive set of pre-configured audit jobs and reports that |
| 129 | + provides visibility into various aspects of a Db2 Databases: Sensitive Data Discovery and Object |
| 130 | + Permissions. |
| 131 | +- Instance Discovery – The Instance Discovery Solution discovers instances on supported database |
| 132 | + servers. |
| 133 | +- MongoDB Solution – The MongoDB Solution automates the process of understanding where MongDB |
| 134 | + databases exist and provides an overview of the MongoDB environment in order to answer questions |
| 135 | + around data access. With visibility into every corner of MongoDB and the operating system it |
| 136 | + relies upon, organizations can proactively highlight and prioritize risks to sensitive data. |
| 137 | + Additionally, organizations can automate manual, time-consuming, and expensive processes |
| 138 | + associated with compliance, security, and operations to easily adhere to best practices that keep |
| 139 | + MongoDB Server safe and operational. |
| 140 | +- MySQL Solution – The MySQL Solution automates the process of understanding where SQL databases |
| 141 | + exist and provides an overview of the MySQL environment in order to answer questions around data |
| 142 | + access. With visibility into every corner of Microsoft SQL Server and the Windows operating system |
| 143 | + it relies upon, organizations can proactively highlight and prioritize risks to sensitive data. |
| 144 | + Additionally, organizations can automate manual, time-consuming, and expensive processes |
| 145 | + associated with compliance, security, and operations to easily adhere to best practices that keep |
| 146 | + SQL Server safe and operational. |
| 147 | +- Oracle Solution – The Oracle Solution delivers comprehensive permissions, activity, and sensitive |
| 148 | + data auditing and reporting for Oracle databases. Through the power of Access Analyzer, users can |
| 149 | + automate Oracle instance discovery, understand who has access to their Oracle databases, the level |
| 150 | + of permission they have, and who is leveraging their access privileges, identify the location of |
| 151 | + sensitive information, measure adherence to best practices, and generate workflows and reports to |
| 152 | + satisfy security, compliance, and operational requirements. |
| 153 | +- PostgreSQL Solution – Access Analyzer PostgreSQL Solution Set is a set of pre-configured audit |
| 154 | + jobs and reports that provides visibility into PostgreSQL Sensitive Data. |
| 155 | +- Redshift – Access Analyzer Redshift Solution Set is a set of pre-configured audit jobs and reports |
| 156 | + that provides visibility into Redshift Sensitive Data. |
| 157 | +- SQL Solution – The SQL Solution is an auditing, compliance, and governance solution for Microsoft |
| 158 | + SQL Server database. Key capabilities include effective access calculation, sensitive data |
| 159 | + discovery, security configuration assessment, and database activity monitoring. |
| 160 | + |
| 161 | +See the [Databases Solutions](/docs/accessanalyzer/12.0/solutions/databases/overview.md) topic for additional information. |
| 162 | + |
| 163 | +### Dropbox Solution |
| 164 | + |
| 165 | +The Dropbox Solution is an auditing, compliance, and governance solution for Dropbox for Business. |
| 166 | +Key capabilities include effective access calculation, sensitive data discovery, file content |
| 167 | +inspection, inactive access and stale data identification, and entitlement collection for |
| 168 | +integration with Identity & Access Management (IAM) processes. |
| 169 | + |
| 170 | +See the [Dropbox Solution](/docs/accessanalyzer/12.0/solutions/dropbox/overview.md) topic for additional information. |
| 171 | + |
| 172 | +**NOTE:** Sensitive data auditing requires the Sensitive Data Discovery Add-on. |
| 173 | + |
| 174 | +### Exchange Solution |
| 175 | + |
| 176 | +The Exchange Solution provides auditing and reporting on multiple aspects of the Exchange |
| 177 | +environment to assist with identifying risk, understanding usage, and decreasing bloat. Areas of |
| 178 | +focus include Audit and Compliance, Maintenance and Cleanup, Metrics and Capacity, Operations and |
| 179 | +Health, Public Folders and Configuration Baseline. |
| 180 | + |
| 181 | +See the [Exchange Solution](/docs/accessanalyzer/12.0/solutions/exchange/overview.md) topic for additional information. |
| 182 | + |
| 183 | +**NOTE:** Sensitive data auditing requires the Sensitive Data Discovery Add-on. |
| 184 | + |
| 185 | +### File Systems Solution |
| 186 | + |
| 187 | +The File Systems Solution is an auditing, compliance, and governance solution for Windows, NAS, |
| 188 | +Unix, and Linux file systems. Key capabilities include effective access calculation, data owner |
| 189 | +identification, governance workflows including entitlement reviews and self-service access requests, |
| 190 | +sensitive data discovery and classification, open access remediation, least-privilege access |
| 191 | +transformation, and file activity monitoring. |
| 192 | + |
| 193 | +See the [File System Solution](/docs/accessanalyzer/12.0/solutions/filesystem/overview.md) topic for additional information. |
| 194 | + |
| 195 | +**NOTE:** Activity auditing requires the Activity Monitor. Sensitive data auditing requires the |
| 196 | +Sensitive Data Discovery Add-on. |
| 197 | + |
| 198 | +### SharePoint Solution |
| 199 | + |
| 200 | +The SharePoint Solution is a comprehensive set of audit jobs and reports which provide the |
| 201 | +information every administrator needs regarding SharePoint on-premises and SharePoint Online |
| 202 | +infrastructure, configuration, performance, permissions, required ports, and effective rights. |
| 203 | + |
| 204 | +See the [SharePoint Solution](/docs/accessanalyzer/12.0/solutions/sharepoint/overview.md) topic for additional information. |
| 205 | + |
| 206 | +**NOTE:** Sensitive data auditing requires the Sensitive Data Discovery Add-on. |
| 207 | + |
| 208 | +### Unix Solution |
| 209 | + |
| 210 | +The Unix Solution reports on areas of administrative concern for Unix and Linux systems. Attention |
| 211 | +is given to users and group details, privileged access rights, and NFS and Samba sharing |
| 212 | +configurations. |
| 213 | + |
| 214 | +See the [Unix Solution](/docs/accessanalyzer/12.0/solutions/unix/overview.md) topic for additional information. |
| 215 | + |
| 216 | +### Windows Solution |
| 217 | + |
| 218 | +The Windows Solution allows organizations to quickly inventory, assess, and secure their Windows |
| 219 | +desktop and server infrastructure from a central location. Key capabilities include privileged |
| 220 | +account discovery, security configuration and vulnerability assessment, compliance reporting, and |
| 221 | +asset inventory. |
| 222 | + |
| 223 | +See the [Windows Solution](/docs/accessanalyzer/12.0/solutions/windows/overview.md) topic for additional information. |
0 commit comments