Seeing the un-seeable can be a challenge for IT. With billions of events to collect and review from a variety of sources, both on premises and in the cloud, it’s difficult to find relevant data and make sense of it. And in the event of a security breach, either internal or external, the ability to locate where the breach originated and what was accessed can make a world of difference.
IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool’s web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever to:
IT Security Search is available as part of several Quest solutions including Enterprise Reporter, Change Auditor, InTrust, Recovery Manager for AD, and Active Roles that pulls data and feeds it into a single pane of glass. From here, you can easily review and act upon all of the various activities in your on-premises or hybrid environment.
Gather native (Windows server, Unix/Linux, workstation and more) logs as well as third-party logs from across your diverse enterprise network with InTrust log management.
Conduct full-text search on long-term event log data and other server data for compliance and security purposes with InTrust, saving time spent looking for events.
Discover which AD objects have changed, including before and after values, and restore them in a few clicks with Recovery Manager for AD.
The following versions of data-providing systems are supported in this version of IT Security Search:
Additional requirements for the Recovery Manager for Active Directory connector:
Additional requirements for the Active Roles connector:
The IT Security Search Web interface works correctly with the following browsers:
The minimum supported monitor resolution is 1024x768.
To find out the disk requirements for IT Security Search installation please refer to the IT Security Search Support Page.
Easily correlate disparate IT data into an interactive search engine.
Learn how to investigate GPO changes with IT Security Search from Quest.
In this short video, learn how to investigate account lockouts with IT Security Search.
In this video, learn about investigating changes made via nested group access with IT Security Search from Quest.
The key to breaking free of this conundrum is recognizing that you don't have to send every log you collect to your SIEM. Download this white paper today and learn about a log data collection and processing model that will enable you to
This eBook provides solutions to stop insider threats, manage privileged accounts, simplify GPO management and administration.
In this webcast, learn how to simplify and enhance Active Directory administration and security with IT Security Search.
Improve endpoint security and log management. Learn the top 3 workstation logs to monitor and how Quest InTrust and IT Security Search simplify the process.
Securely collect, store and receive event data from Windows, Unix and Linux systems
Reduce backup recovery time and costs to reduce user impact
Secure and automate the administration, access and provisioning of users and groups for AD/AzureAD
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.